The document discusses instruction sets and their components. It defines an instruction set as the list of instructions available for the CPU, which are encoded in binary machine language or assembly language mnemonics. Each instruction contains an operation code and may include source and destination operand references. Instruction formats can vary in the number of operands from zero to three addresses. Instruction length, encoding techniques, and types of instructions like data transfer, arithmetic, and control instructions are also covered.
Memory reference instructions used in computer architecture is well demonstrated with examples. It will probably help you understand each referencing instructions.
Memory reference instructions used in computer architecture is well demonstrated with examples. It will probably help you understand each referencing instructions.
loader and linker are both system software which capable of loads the object code, assembled by an assembler, (loader) and link a different kind of block of a huge program. both software works at the bottom of the operation (i.e. closer to the hardware). in fact, both have machine dependent and independent features.
loader and linker are both system software which capable of loads the object code, assembled by an assembler, (loader) and link a different kind of block of a huge program. both software works at the bottom of the operation (i.e. closer to the hardware). in fact, both have machine dependent and independent features.
Discussed different types of dynamic interconnection networks. Graphically demonstrated single and multiple bus interconnection networks. Discussed different types of switch based interconnection networks. Graphically shown the mechanisms of crossbar, single and multistage interconnection networks. Graphically explained the working principle of omega network, Benes network, and baseline networks.
Machine Learning in Agriculture Module 6: classificationPrasenjit Dey
Define the classification problem. Discuss different performance evaluation metrics in classification problem, Graphically demonstrate the concepts of true positive, true negative, false positive, false negative, sensitivity and specificity, confusion matrix, precision and recall, Concepts of ROC and AUC curve
Machine Learning in Agriculture Module 1Prasenjit Dey
Discuss the opportunities of incorporation of machine learning in agriculture. Briefly discuss different machine learning strategies. Briefly discuss the ways of machine learning can be used
Describe the non linear dynamic pipeline concepts, Creation of reservation table from non-linear pipeline architecture, creation of collision vector from reservation table, generation of state diagram, derivation of simple cycles, greedy cycles and MAL(Minimum Average Latency)
Explained response time and CPU time, difference between them, Explained clock cycle time, clock frequency, clock rate, cycle per instruction(CPI), million instruction per second(MIPS), etc. Describe Amdahl's law with numerical examples
Defined instruction set architecture, discussed different types of instructions in the MIPS architecture, e.g., arithmetic, logical, shift etc. Discussed different types of registers in MIPS, R-format, I-format and j-format instructions have been explained with examples. Further assembly language code for conditional operations e.g., if..else, swap operation, loop operation are demonstrated.
Register transfer and microoperations part 2Prasenjit Dey
Discussed different types of micro-operations, e.g., arithmetic, logical, shift micro-operations. Explained Half Adder, Full Adder, Binary Adder subtractor. Discussed different types of logical micro-operations including XOR, OR, AND, NOT as well as Bit manipulation operations including, selective set, selective complement, insertion, reset, set etc. Discussed different types of shift micro-operations, arithmetic, logical, and circular shifts. Hardware implementation of a single unit (ALU) capable of performing all the arithmetic, logical and shift micro-operations.
Register transfer and microoperations part 1Prasenjit Dey
Register transfer language, hardware implementation of bus transfer using multiplexer and three state buffer, hardware implementation of memory transfer e.g., memory read and memory write.
Different types of memory and hardware designs of RAM and ROMPrasenjit Dey
Discussed the memory hierarchy, the characteristics of memory like location, unit of data transfer, access method, and performance. Then demonstrate the design of both RAM and ROM chip. Shows how to configure the memory unit composed of both RAM and ROM using multiple RAM and ROM chips i n hardware. Finally, demonstrate the design of the magnetic disks
Explain cache memory with a diagram, demonstrate hit ratio and miss penalty with an example. Discussed different types of cache mapping: direct mapping, fully-associative mapping and set-associative mapping. Discussed temporal and spatial locality of references in cache memory. Explained cache write policies: write through and write back. Shown the differences between unified cache and split cache.
Explain the drawbacks of Ripple carry adder, then derives the expression of Carry look ahead adder from Full Adder. After that, demonstrated the generalized expression of Carry look ahead adder. Finally, shows the hardware architecture of a Carry look ahead adder.
Computer organization basics and number systemsPrasenjit Dey
Discussed the basics of a computer, e.g., CPU, ALU, CU, different types of memory, instruction cycle. Then, different number systems like binary, gray, excess-3 has been explored. Finally, binary arithmetic has been explain by one's & two's complement.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
2. Contents
2
• What is instruction set?
• Elements of an Instruction
• Op-code Encoding
• Instruction Types
• Data Transfer, data Processing, and Control
• Types of Operand
• Instruction Formats
• Instruction Length
• Number of Addresses
3. What is an Instruction Set?
• It is the list of instructions available for the CPU
• RISC, CISC, VLIW, etc.
• These instructions are written in machine language(binary
representation)
• But for human understanding, we represent the instructions in
assembly level language
• Assembly language consists of mnemonics
• e.g., MOV A, B (A B)
• Here, Op-code is MOV and Operands are A, B
3
4. Elements of an Instruction
Operation code (Op-code)
e.g., LOAD, STOR, ADD, SUB, MPY, DIV
Source operand reference
address of source operand of operation, e.g. register, memory
location, I/O
Destination operand reference
address of destination /result operand of operation, e.g.
register, memory location, I/O
4
6. Byte ordering
how the bytes of an instruction are organized in a word
1. Big-endian: bytes in word are ordered from left-to-right, e.g.,
Motorola
2. Little-endian: bytes in word are ordered right-to-left, e.g., Intel
6
Big endian
0 0 1 2 3
4 4 5 6 7
8 8 9 10 11
12 12 13 14 15
Address
32 bits
Little endian
3 2 1 0 0
7 6 5 4 4
11 10 9 8 8
12 13 14 15 12
Address
32 bits
Word 0
Word 1
Word 2
Word 3
Word 0
Word 1
Word 2
Word 3
7. Instruction Cycle State Diagram7
Instruction
fetch
Instruction
decode
Operand
address
computation
Operand
fetch
Operation
Operand
address
computation
Operand store
Instruction
address
computation
Multiple
operands
Multiple
results
Return vector data
Fetch next instruction
8. Op-code Encoding
Op-code field must have at least N bits to encode 2N instructions
Need Op-code encoding technique
There are 2 types of op-code encoding
1. Block-code technique
2. Expanding op-code technique
Block-code technique
An N-to-2N decoder is used to decode all the instructions.
8
N-to-2N
decoder
N-bit op-code
instruction 0
instruction 1
instruction 2
Instruction 2N - 1
.
.
.
.
.
.
9. Op-code Encoding
Op-code Address 1 Address 2 Address 3
1 1 1 1 Op-code Address 1 Address 2
9
Expanding op-code technique
If there are only 15 such three-address instructions
then one of the unused op-code can be used to expand the instruction
set it to two-address, one-address or zero address instructions
A compromise between large instruction set and short op-
codes, thus short instructions
When the op-code is short, a lot of bits are left to hold the
operands
Let an (4+12) bit instruction with a 4-bit op-code and three 4-
bit addresses
can at most encode (24=16) three-address instructions
10. Expanding op-code technique
1 1 1 1 1 1 1 1 Op-code Address 1
1 1 1 1 1 1 1 1 1 1 1 1 Op-code
10
Similarly, this expanded op-code field can encode at most 16
two-address instructions.
if there are less than 16 such instructions, we can expand
the op-code further
Here, the three-address instruction can hold 3 operands of 4-bit
address fields or it can hold 1 operand of12-bit address field
Some part of the op-code can be used to specify the instruction format
and/or length
11. 11
Let encode the following instructions
15 instructions with 3 addresses
14 instructions with 2 addresses
31 instructions with 1 address
16 instructions with 0 address
0000 O1 O2 O3
1110 O1 O2 O3
1111 0000 O1 O2
1111 1101 O1 O2
1111 1110 0000-1111 O1
1111 1111 0000-1110 O1
1111 1111 1111 0000
1111 1111 1111 1111
Expanding op-code technique
12. Instruction length Vs. speed
• Shorter instructions have faster fetch and decode time
• Advantages of shorter instructions are:
1. less space in memory
2. Faster transfer to the CPU
• Each instructions in instruction set can be encoded with
minimum number of bit – Huffman encoding
• But instructions need to be decoded bit by bit, can be slow
12
13. Design Goals
Operation
How many ops?
What can they do?
How complex are they?
Data types (length of words, number representation)
Instruction formats
Length of op-code field
Length and number of addresses
Registers
Number of CPU registers available
Which operations can be performed on which registers? General
purpose and specific registers
Addressing modes (next class)
13
14. Types of the instructions
There are 3 types of instructions
1. Data transfer: registers, main memory, stack or I/O
2. Data processing:
1. Arithmetic, e.g., ADD, SUB
2. logical, e.g., AND, OR
3. Control:
1. system control, e.g., Test-And-Set
2. Program Control
1. Unconditional branch, e.g., J B
2. Conditional branch, e.g., BEQ A, B, target
3. Subroutine call, e.g., RET
4. Interrupt-handling, e.g., TRAP
14
15. Data Transfer
15
I/O Operations
.
In case of I/O mapped I/O, dedicated I/O instructions are used , e.g.
INPUT, OUTPUT
But, in case of memory mapped I/O, data transfer instructions are used
Or it may be done by a separate controller (DMA), e.g., Start I/O, Test I/O
Load, Store, move, clear, set, push, pop, etc.
Contains source and destination operand
Register, memory, stack
16. Arithmetic
ADD, SUB, MUL, DIV, INC, DEC, etc.
May include data transfer instructions
16
Logical
AND, OR, NOT, XOR, SET, CMP
May include shift instructions to perform complex tasks
Arithmetic left shift multiply the operand by 2 (without overflow)
Arithmetic right shift divide the operand by 2 (truncate for odd number)
logical right shift is used to transfer the lower order byte from from 16-bit
word
17. Control Instruction
System control
privileged instructions used to accessing control registers or
process table, e.g., STOP, HALT, RTE, etc.
Used by operating systems in kernel mode
17
Program Control/ Control Transfer
Unconditional branch:
jump into any location without condition, e.g., J
conditional branch:
Jump into any location based upon some condition, e.g., BEQ
Subroutine call:
used to call a subroutine, e.g., CALL, RET
Interrupt-handling:
used to invoke an interrupt, e.g., TRAP
20. Use of Stack and stack pointer 20
601
1201
601
601
1101
601
601
Next address
after
call subroutine 1
SP = 601
Next address
after
call subroutine 2
SP = 1101
Return from
subroutine 2
Pop 1101
Next address
after
call subroutine 2
SP = 1201
Return from
subroutine 2
Pop 1201
Return from
subroutine 1
Pop 601
500 : Main Program
600 : call Subroutine 1
1100 : call Subroutine 2
1200 : call Subroutine 2
21. Types of Operand
Addressing mode: direct, indirect, etc.
Number representation:
integer, fixed point (2scomplement)
floating point (sign, significant, exponent)
(packed) decimal
Character coding: ASCII
Flag bits (Boolean 0 or Boolean 1)
21
22. Instruction Formats
It is the bit encoding in an instruction
It consists of 2 fields
1. Op-code field
2. Operand field
Operand(s) can be implicit or explicit
There exists different instruction formats in an instruction set
22
23. Instruction Length
The length of an instruction depends on the followings:
1. Memory size
2. Addressing mode
3. Bus structure, e.g., width
4. CPU complexity
5. CPU speed
Trade off between powerful instruction set and saving space
Expanding op-code technique
23
24. Number of Addresses in an instruction
More addresses
Registers and inter-register operations are quicker
Less instructions per program
More complex instructions
Fewer addresses
Faster fetch/execution of instructions
More instructions per program, e.g. data movement
Less complex instructions
24
Based on number of addresses instructions can be of 4 types
1. 3 address instruction
2. 2 address instruction
3. 1 address instruction
4. 0(zero) address instruction
25. 3 address instruction
Needs very long words to hold everything
Not common
1. ADD F,A,B F A+B
2. MPY T,D,E T DxE
3. SUB T,T,C T T-C
4. DIV F,F,T F F/T
25
Op-code Result Operand 1 Operand 2
F = (A + B) / [(C - (D x E)]
26. 2 address instruction
Reduces length of instruction
Requires extra work: temporary storage
1. MOVE F,A F A
2. ADD F,B F F+B
3. MOVE T,D T D
4. MPY T,E T TxE
5. SUB T,C T T-C
6. DIV F,T F F:T
26
Op-code Result Operand 1
F = (A + B) / [(C - (D x E)]
27. 1 address instruction
Implicit second address, usually a register (accumulator, AC)
1. LOAD D AC D
2. MPY E AC ACxE
3. SUB C AC AC-C
4. STOR F F AC
5. LOAD A AC A
6. ADD B AC AC+B
7. DIV F AC AC:F
8. STOR F F AC
27
Op-code Operand 1
F = (A + B) : [(C - (D x E)]
28. 0 (zero) address instruction
All addresses are implicit, e.g. ADD
Uses a stack
1. pop A
2. pop B
3. ADD
4. Push
28
Op-code
C = (A + B)