In-Depth Analysis of Computer Systems Architecture Principles

Verified

Added on  2024/04/24

|35
|6207
|361
Report
AI Summary
This report provides a comprehensive overview of computer systems architecture, dividing the subject into three main parts. The first section details number systems and their representation within computer systems, including data conversion into binary format for various data types like music, video, and images, along with explanations of number system conversions and logic gates. The second part explores the Von-Neumann architecture, its components, memory types, and communication methods using polling and interrupts. Finally, the report compares Reduced Instruction Set Computer (RISC) and Complex Instruction Set Computer (CISC) architectures and elucidates the fetch-execute cycle with its associated processor registers. This document is available on Desklib, a platform offering a wide range of study tools and solved assignments for students.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Computer Systems Architecture
0
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Introduction................................................................................................................................4
LO1 Understand how data can be represented within computer systems..................................5
P1. Explain using examples how numeric and alphanumeric data can be coded within a
computer system.....................................................................................................................5
P2. Explain using examples how different types of data can be converted and stored in
computer system.....................................................................................................................8
P3. Convert numeric data between different number systems including floating point......10
P4. Carry out Boolean logic operations...............................................................................13
LO2 Understand the functions of computer system components............................................17
P5 illustrate the key computer system components and how they interact..........................17
P6 explain the different types of memory that can be attached to a processor....................20
P7 explain how polling and interrupts are used to allow communication between processor
and peripherals.....................................................................................................................24
LO3 Understand the principles of processor operations..........................................................27
P8 compare Reduced Instruction Set Computer (RISC) chips and Complex Instruction Set
Computer (CISC) chips........................................................................................................27
P9 illustrate the use of the different processor registers in the fetch-execute cycle............30
Conclusion................................................................................................................................32
References:...............................................................................................................................33
1
Document Page
List of Figure
Figure 1: ASCII code table........................................................................................................6
Figure 2: Binary represent of image...........................................................................................8
Figure 3: sound represent in binary format................................................................................9
Figure 4: Logical diagram of AND Gate.................................................................................13
Figure 5: Logical diagram of OR Gate....................................................................................14
Figure 6: Logical diagram of NOT Gate..................................................................................14
Figure 7: Logical diagram of NAND Gate..............................................................................15
Figure 8: Logical diagram of NOR Gate..................................................................................15
Figure 9: Logical diagram of EXOR Gate...............................................................................15
Figure 10: Logical diagram of ENXOR Gate..........................................................................16
Figure 11: Logical diagram......................................................................................................16
Figure 12: Von-Neumann Architecture...................................................................................17
Figure 13: Keyboard................................................................................................................17
Figure 14: Mouse.....................................................................................................................18
Figure 15: Printer.....................................................................................................................18
Figure 16: Monitor...................................................................................................................18
Figure 17: ALU structure.........................................................................................................19
Figure 18: Memory unit in computer.......................................................................................20
Figure 19: Computer hard drive...............................................................................................22
Figure 20: Pen Drive................................................................................................................22
Figure 21: Interrupt process in system.....................................................................................24
Figure 22: Polling process in System......................................................................................25
Figure 23: RISC Architecture..................................................................................................27
Figure 24: CICS Architecture..................................................................................................28
Figure 25: Difference between RICS and CISC working........................................................29
Figure 26: Fetch-execute cycle in Processor register...............................................................30
2
Document Page
List of Table:
Table 1: Conversion table of number system.............................................................................5
Table 2: Binary Number system for decimal number................................................................7
Table 3: Truth table of AND gate............................................................................................13
Table 4: Truth Table of OR Gate.............................................................................................14
Table 5: Truth Table of Not Gate.............................................................................................14
Table 6: Truth table of NAND Gate........................................................................................14
Table 7: Truth Table of NOR Gate..........................................................................................15
Table 8: Truth table of EXOR Gate.........................................................................................15
Table 9: Truth table of ENXOR Gate......................................................................................16
Table 10: Truth table of given logical diagram........................................................................16
Table 12: Compression between interrupts and polling...........................................................25
Table 13: Comparison Table between RISC and CISC...........................................................28
3
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
The computer system is a complex system which contains various sub-systems. Each sub-
system is a part of computer hardware. System parts interact is called the "Computer
Architecture".
Report of Computer Architecture is divided into three parts. The first part, it is described
number system and their representation in the computer system. Future, this part is given
detail about Data (like music, video, image, audios) conversion into binary format and how to
store into the computer system. It also explains number system conversion one format to
other format and logical gate with the truth table.
The second part, it is explained system Von-Neumann architecture with its components,
Memory which is used by system and polling or interrupts which is used for sharing
information.
The third part, it is described the comparison between RISC and CISC and the end of the
report explain fetch-execute cycles and the steps.
4
Document Page
LO1 Understand how data can be represented within computer systems
P1. Explain using examples how numeric and alphanumeric data can be coded
within a computer system
Alphanumeric Data: Alphanumeric data is collection of numbers (0 - 9), letters (A to
Z or a to z), and special character (@, #, $, %, -,+, *, / so-on). Special character are
categorized in mathematic character (+, *,/, -) punctuation character (. : ; ! @) and
other ($, <, >,=) so-on. For example, 134mhk@#$$, qweERT235*&^
Numeric Data: Numeric data is containing a number in the data. Data contains 0 to 9
digits. The numeric data system is categorized into three systems. For example:
1. Binary number: Binary number system is used 2 as the base. It contains 2
value such as 0 and 1. It is represented in 20, 21, 22 and so-on. the base-of-2.
2. Decimal number: it is a standard number system to represent the non-integer
and integer. Decimal system is used the 10 as the base. It contains Zero to
Nine numbers in the number system. The decimal number is representing in
100, 101, 102 and so-on.
3. Hexa-Decimal number: Hexa-Decimal number system is used 16 as the base.
It contains 16 value such as 0 to 9 and A to F letters. It is represented in 16 0,
161, 162 and so-on.
Table 1: Conversion table of number system
5
Document Page
Character Encoding: Before the stored a file in the database, a file is going to
encoding and decoding. The computer system is working on 0 and 1 so it is converted
the user program into machine language. Machine language is working on zero or
one. This conversion is called Character Encoding. Character encoding is two types.
1. ASCII: it is referred as American Standard Code for Information Interchange
(ASCII). It is used 0 to 127 ASCII code for represented letters and special
characters. It is developed before 2000. ASCII does not hold Chinese
characters, Russian alphabet, Arabic alphabet, and European characters (Lee,
2016).
For example, Hello ASCII code is 7269767679.
Figure 1: ASCII code table
2. Unicode: it is designed by Unicode Consortium. Unicode is offered distinctive
number for each character. It is independent from platform, application,
device, or language. Unicode is supported by operating systems, Internet,
laptops, search engines, smartphones, browsers, and WWW. Unicode is to
implement in ISO/IEC 10646. Unicode defines two types which are
1. Encoding system (UTF-16 and UTF-8)
2. character set (Unicode, 2016)
Binary Language: Binary code is written for numbers, commands, sounds, letters,
and images. It contains two values 0 and 1. It is also called machine language or
assembly language because all computer and software understand this language
(Zych, 2015).
6
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table 2: Binary Number system for decimal number
7
NUMBER BINARY NUMBER NUMBER BINARY NUMBER
1 1 6 110
2 10 7 111
3 11 8 1000
4 100 9 1001
5 101 10 1010
Document Page
P2. Explain using examples how different types of data can be converted and
stored in computer system
Image
The image is a collection of the pixel. In the image, pixels are arranged in the array of
squares. Each pixel needs 24 bits. The image file is JPEG, GIF and PNG format. The image
is used compression for change in size in the image. Lossless compression and lossy
compression are two type of image compression.
Image Conversion into the binary is required because the computer could be work on image
and display on system screen. The image is a collection of pixels and pixel is created from
binary numbers. If the image is black and white than one represents the black and zero
represents the white.
Figure 2: Binary represent of image
If the image is color image than image is used 2 bit to represent the pixel-like as
00 represents white
01 represents Blue
10 represents Green
11 represents Red
Audio and Music
Audio and Music is a format of sound. The sound represents the analog signals so it is stored
and apprehended in analog format. Audio and Music files are traveled environment in the
waves form. Wave are analog signals. But computer system is work on digital signals so
PCM (Pulse-code modulation) algorithm is used for converts’ analog signals to digital
signals. After the conversion, signals are store into digital format. Audio signals Sampling
frequency 48,000 Hz.
8
Document Page
Figure 3: sound represent in binary format
Sample Rate:
The sampling is a process in which continuous- signal is converted into a discrete signal.
Sampling rate is representing in hertz, or Hz which measures speed of sampling. For
example, sampling speed of the smoother animation image is faster than the choppy
animation image (Computerhope, 2017).
Video
Video is a collection of the image so it is also analog signals. Video needs more space for
store data into the system because of its size large. For video conversion or reduce size of
video, the system is used different encoding algorithm. Video conversion process is removed
the unwanted parts of video (file format, n.d.).
.
9
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
P3. Convert numeric data between different number systems including floating
point
Number System:
Conversion binary to decimal and viva-Vera: Convert from decimal to binary:
346
2 346 R
2 173 0
2 86 1
2 43 0
2 21 1
2 10 1
2 5 0
2 2 1
2 1 0
1
So decimal number 34610 binary conversion is 1010110102 Convert from binary to decimal:
1010111
1*26 + 0*25 + 1*24 + 0*23 + 1*22 +1*21 + 1*20 = 8810
So binary number 10101112 decimal conversion is 8810
Conversion hexadecimal to decimal and viva-Vera: Convert from Decimal to hexadecimal:
3759
16 3759 R
16 234 E
16 14 A
F
10
Document Page
So decimal number 375910 binary conversion is EAF16
Convert from Hexadecimal to decimal:
B59F
B*163 + 5*162 +9*161 + F*160 = 4649510
So binary number B59F16 decimal conversion is 4649510
Conversion Floating point to Binary and viva-Vera:
Convert from Floating point to binary: Floating point number has 2 parts, the first
part is before decimal and second part is after the decimal. Before the decimal part is
converted into binary by the divided operation (divided by 2) and the terms after the
decimal part are converted into binary by the multiplied operation (multiplied by 2).
34.35
Decimal number 34 is binary conversion:
2 34 R
2 17 0
2 8 1
2 4 0
2 2 0
2 1 0
1
Fraction number 0.35 binary conversion:
R
0.35* 2 = 0.70 0
0.70* 2 = 1.40 1
0.40 * 2 = 0.80 0
0.80 *2 = 1.60 1
0.60 * 2= 1.20 1
0.20 *2 = 0.40 0
0.40 * 2 = 0.80 0
So Floating point number 34.35 binary conversion is 100010.0101100
11
Document Page
Convert from Binary to floating point:
0.11102
1*2(-1) + 1*2(-2) + 1*2(-3) + 0*2(-4)
0.5 +0.25 +0.125 + 0 = 0.875
So binary number 0.11102 Floating point conversion is 0.875
12
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
P4. Carry out Boolean logic operations
Boolean logic operations: Boolean logic operations take input Boolean value and give the
answer in the Boolean value. True and false are two Boolean values. It also represents the 1
and 0. False value is representing by 0 and True value is representing by 1. Boolean
operations are performed by the logical gate. AND, OR, and NOT are logic gates which are
mainly used in Boolean logic operations (Fairhead, 2015).
Logic Gates
It is a fundamental block of the digital circuit system. logic gates take 2 two inputs and
given 1 output.
Name of Logic gates:
AND
OR
XOR
NOT
NAND
NOR
XNOR.
AND gate:
Table 3: Truth table of AND gate
Figure 4: Logical diagram of AND Gate
OR gate:
Table 4: Truth Table of OR Gate
A B Q= A+B
False False False
True False True
13
A B Q=AB
True True True
False True False
True False False
False False False
Document Page
False True True
True True True
Figure 5: Logical diagram of OR Gate
NOT gate
Table 5: Truth Table of Not Gate
A ~B
True False
False True
Figure 6: Logical diagram of NOT Gate
NAND gate
Table 6: Truth table of NAND Gate
A B Q= ~(AB)
True True False
False True True
True False True
False False True
Figure 7: Logical diagram of NAND Gate
14
Document Page
NOR gate
Table 7: Truth Table of NOR Gate
A B Q= ~(A+B)
False False True
True False False
False True False
True True False
Figure 8: Logical diagram of NOR Gate
EXOR gate
Table 8: Truth table of EXOR Gate
A B Q= A B
True True False
False True True
True False True
False False False
Figure 9: Logical diagram of EXOR Gate
EXNOR gate
Table 9: Truth table of ENXOR Gate
A B Q= A ʘ B
True True False
False True True
True False True
False False False
15
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 10: Logical diagram of ENXOR Gate
Example: Truth table of given logical diagram
Figure 11: Logical diagram
Table 10: Truth table of given logical diagram
A B AB C ~C Q= (AB)
+ (~ C)
D QD Final
Output
True True True True False True True True False
False True False True False False False False True
True False False False True True True True False
False False False False True True False False True
16
Document Page
LO2 Understand the functions of computer system components
P5 illustrate the key computer system components and how they interact
Von-Neumann Architecture: computer is designed Von-Neumann Architecture concept. It
is also kwon as Von-Neumann model or Princeton architecture. It is collection of ALU
(Arithmetic and Logic unit), Memory units, Registers, Input device, CU (Control unit) and
Registers. Von-Neumann Architecture is stored-program which means data (program and
instruction data) are stored same memory location (Infocenter.arm, 2009).
Figure 12: Von-Neumann Architecture
Input Device: it is a device which is used the user to a connected computer system with the
help of send data into the computer (Thakur, n.d.).
Keyboard: it is the most useful input device. The keyboard is used to give the data and
commands to the system. It contains 108 key which holds letters, number, and special
character.
Figure 13: Keyboard
Mouse: it is a pointing input device. The mouse has three buttons such as a left button, right
button, and middle button.
17
Document Page
Figure 14: Mouse
Output Device: it is a device which is used the computer system to the connected user with
the help of send data to the user (Thakur, n.d.).
Printer: it is an output device which is used to print the data on paper in human-readable
form. Black and white laser printer and color inkjet printer are the types of printer.
Figure 15: Printer
Monitor: It is output device which is used for display the result on the computer screen.
Figure 16: Monitor
Memory Unit: It is the brain of the computer system. Memory is used to store the
information and command. The memory unit is divided into the small block. Each memory
block holds a memory address. The system has two type memory such Primary memory
(main memory) and Secondary memory (Simplified, 2008).
Registers: It holds the small set of data which is used by the computer processor. The
register contains commands, memory address or the special type of data like a bit individual
or sequence characters. Register size must be 64-bit which is enough large (Dev, 2009).
18
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Name of registers:
Memory address registers
Data registers
Memory address registers
Accumulator registers
Program counter
CPU: It is called Central Processing Unit which is the brain of the computer. It is also
known as process and microprocessor. It is a collection of CU, ALU, memory, and registers.
CPU is IC (integrated circuit) which is executed the program. The program takes input and
gives output on system screen.
ALU: It is referred as Arithmetic and Logic Unit. It is a part of CPU. ALU is used one clock
cycle for arithmetic operations (like as addition, subtraction, multiply, and division) and logic
operation (like as Gate operation, compression operation).
Figure 17: ALU structure
19
Document Page
P6 explain the different types of memory that can be attached to a processor
Memory is used to store the information (like as data and commands). Computer memory
size is measured in Megabyte (MB), Gigabyte (GB), and Terabyte (TB). Memory is a large
block which is divided into the small part to store information. Each part contains a memoir
address. Memory is three types which are
1. Primary Memory
2. Secondary Memory
3. Cache Memory
Figure 18: Memory unit in computer
Cache memory: It is the fastest memory which is used for temporary storage. Cache
Memory saved latest commands or the records which are used CPU frequently. Its size is
small compare than primary memory or secondary memory.
Types of cache: Cache memory is divided into three levels.
Level 1: It is fastest cache memory which size is 8 Kb to 128 Kb. It is built on the
processor chip.
Level 2: It is slower than level 1 but its size is 512 Kb to 8 Mb.
Level 3: It is slowest cache memory which size is 8MB.
Primary Memory: It is also known as internal memory, semiconductor memory, system
memory, and main memory. CPU is directly accessing the primary memory data. It is costly,
fastest, and small size memory. Its size range is 512 MB to 2GB (Simplified, 2008).
Type of Primary Memory:
RAM (Random Access Memory): RAM has stored the commands and data. It holds
information until power is on so RAM is a volatile memory. RAM is write and read
memory (Simplified, 2008).
Type of RAM:
20
Document Page
1. SRAM (Static-Random Access Memory.): SRAM is hold data till power is
not off. It is faster and costly. SRAM does not need the refreshing circuit. It is
stored the data in voltage form.
2. DRAM (Dynamic-Random Access Memory.): DRAM is lost the data in few
msec. It is a slow and cheap memory. DRAM needs a refreshing circuit. It is
stored the data in Charger form.
ROM (Read Only Memory): It is also known firmware and non-volatile memory
because it is stored the data permanently. ROM data do not update because it is the
read-only memory (Simplified, 2008).
Type of ROM:
1. Programmable read-only memory (PROM): It is stored the data two type.
After second-time data is stored permanently.
2. Erasable Programmable read-only memory (EPROM): It is used UV light to
erased the data. It overcomes the PROM problem. EPROM is more flexible
and expensive compare than PROM
3. Electrically Erasable read only memory (EEPROM): It is used electrical
charge for erased the data. It overcomes the EPROM problem. EEPROM is
more flexible and expensive compare than EPROM. It is the example of flash
memory. EEPROM is slowest ROM memory.
Secondary Memory: It is a place where store instruction, program, and information for long-
term. Optical disks and Hard disk are the examples of secondary memory. It is slow, large
capacity, cheap and not directly connected to the processor. It is also known as auxiliary
storage, external memory, and non-volatile memory (Chortle, n.d.).
Hard Drive: In the computer system, the hard drive is a biggest data storage device.
It is used to store software titles, operating system, and another file. Hard Drive size is
250 GB to 5 TB. The hard drive contains sectors which are placed on tracks and
tracks are kept on rotating platters. Hard drive producers include Seagate, Hitachi,
Western Digital, and Toshiba (Fisher, 2017).
21
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 19: Computer hard drive
Pen Drive: it is a portable Universal Serial Bus (USB). Pen drive is used for
transferring and storing data (like as video, audio, and document files) from the
system. It is also known as Flash drive, thumb drive, and jump drive. Pen drive size is
2 GB to 256 GB (wiseGEEK, n.d.).
Figure 20: Pen Drive
Register: It is the type of memory which is used of the store, accept, and transfer information
and command that is used instantaneously by the CPU. Register size is 64bit. Registers are
manufactured from fast multi-ported memory block (Dev, 2009).
Type of Register:
Memory Address Registers: it holds memory address of commands and information
that CPU wants to be read or write data in memory.
Memory Buffer Registers: it is placed between CPU and memory. It is the store which
information which is going to be read from memory or written to memory.
Current Instruction Registers: it is placed in CU. CIR is a store instruction which is
currently executed in the program.
22
Document Page
Memory Data Registers: it is used for stored RAM memory data. It also holds data
which is going to be decoded.
Accumulator Registers: it is used in ALU for arithmetic and logical operations. It
saved the preliminary data, intermediate results and contains the final result.
Program Counter: it is stored Next instructions which executed in the program. PC is
also called Instruction Pointer Register.
23
Document Page
P7 explain how polling and interrupts are used to allow communication between
processor and peripherals
System peripherals and processor are communicated or sharing the information through
interrupts and polling process.
Interrupts:
Interrupts is emphases on hardware processing. CPU is also called Microprocessor. The
microprocessor is sensed the device that requires the Microprocessor attention. It is sensed
the Interrupts through interrupt-request line wire. Software, program, hardware, and user
have crated the Interrupt which is handled by the interrupt handler. The microprocessor is
response the Interrupts but it does not know about creation time. When the Microprocessor is
recognized interrupt signal, then it pauses the currently run task and replies Device which
sends the interrupt signal (Boone, 2015).
CPU is working on numerous of the task at a time because it is a multitasking processor.
Interrupts handler is managed interrupts according to priority algorithm when some time CPU
is received more than one interrupts at a time.
Figure 21: Interrupt process in system
Polling: Polling is emphases on software processing. For the polling process, Miscroprocess
is checked the device a regular time period and checked which device need CPU.It is sensed
by Command-ready bit and busy bit. Both bits are work on binary value 0 and 1. Command-
24
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ready bit is defined that microprocessor is executed the command or not. Busy bit is defined
that microprocessor is busy or not. If the Command-ready bit of device is set 0 which mean
command is not executed by the microprocessor and set 1 which mean command is executed
by the microprocessor. If the busy bit of CPU is set 0 which mean CPU is not busy. and set 1
which means CPU is not busy (Kashyap, 2016).
Figure 22: Polling process in System
Polling process drawback:
It is a time-consuming process when one device is wait CPU attention for working
and CPU is working with another device.
Polling Process Type:
1. Polling of Roll call
2. Polling of Core go-ahead (Slideplayer, n.d)
Table 11: Compression between interrupts and polling
S.N
O
Polling Process Interrupts
1 Microprocessor checked device in a
period of time and offered the service to
device on device need
The microprocessor is provided attention
device when Interrupts occurs.
2 It occurs in a Regular time interval. It occurs in any time.
25
Document Page
3 It is sensed by Command-ready bit. It is sensed by Interrupt-request line.
4 It is used Protocol Mechanism concept. It is used Hardware Mechanism concept.
5 Polling Process service is managed by
CPU.
Interrupts Process service is managed by
CPU.
26
Document Page
LO3 Understand the principles of processor operations
P8 compare Reduced Instruction Set Computer (RISC) chips and Complex
Instruction Set Computer (CISC) chips
RISC: It is referred Reduced Instruction Set Computer. RICS is a type of microprocessor
which is executed the small set of instructions. It increases the performance of the system
because it executes millions of instructions per sec (Agarwal, n.d.).
RISC Example: Nintendo DS and Apple iPod.
RISC Architecture working:
It is work on CPI which RISC has executed the one instruction per cycle. So it is
optimization the CPU for each instruction.
RISC Architecture is work on pipelining so it offered that processor is executed
instructions simultaneously.
RISC contains a large number of registers because it prevents instructions to interact
with memory.
Figure 23: RISC Architecture
CISC:
It is referred Complex Instruction Set Computer. It is used recused the CPI and minimize
instruction in the program. CISC is designed to decrease the memory cost because the large
program needs large memory. Memory is expensive. But CISC has decreased the program
size which reduces the memory cost.
27
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CISC Example: Intel 80486, BM 370/168 and VAX 11/780
CISC Architecture working:
The decoding process of Instruction is Complex. MUL is a complex instruction that is
used for store function.
The register is containing small space chip because the instruction is executed directly
on memory.
Numerous addressing modes are supported by instruction.
Various CISC designs are set up two special registers for the stack pointer, handling
interrupts (Agarwal, n.d.).
Figure 24: CICS Architecture
Table 12: Comparison Table between RISC and CISC
S.No. RISC CISC
1. RISC is work on single clock cycle
because it is used multiple register set.
CISC is work on multiple clock cycle
because it uses single register set.
2. Hardware has executed the instructions.
Instructions are fixed format because
RISC is used few instructions in the
program.
Microprogram has interpreted the
instructions. Instructions format is
variable because CISC is used many
instructions in the program.
28
Document Page
S.No. RISC CISC
3 RISC Architecture is highly pipelined. CISC Architecture is no pipelined or less
pipelined.
4. RISC Instructions has referred the
memory only for the store or load the
instructions.
CISC Instructions has referred the
memory.
5. RISC contains the complexity in
compiler.
CISC contain the complexity in
microprogram.
Figure 25: Difference between RICS and CISC working
29
Document Page
P9 illustrate the use of the different processor registers in the fetch-execute cycle.
Fetch-execute cycle: It is a time of period in which system is read the instructions and
process and executed them. It is used register for read, processor executed the instruction.
Fetch-execute cycle is also known as operation cycle or instruction cycle. This cycle is also
performing until no instruction of process and system is turned off. Fetch-execute cycle is
working on four step.
Figure 26: Fetch-execute cycle in Processor register
Fetch: In the address bus, CPU contains the program counter value. CPU fetches the
instruction from system memory through the data bus. Fetch operation is performed
in the instruction register.
Decode: Decode process work on OP code which is fetched from memory in fetching
cycle. It is the time-consuming process because it interacts with main memory. It
decoded the indirect memory address to direct memory address.
Execute: it is executed the decoded instruction. It gives command the decoded
instruction and displays the result. Decoded instruction is the type of arithmetic or
logical instructions.
Store: In this process, the result is stored into the register which displays on the
screen. Then finally store again in main memory of the system (Bluitt, 2015).
Fetch-execute cycle is performed register. It is used different type of register which is
describes below
30
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1. Memory Address Register (MAR): it contains main memory address of those data
which is currently read or written in the memory.
2. Program Counter: it is an incrementing counter register. PC kept the memory address
of the instruction that is executed next.
3. Current Instruction register (CIR): It is a temporary hold currently memory fetched
instruction.
4. Status register: It stored information or data of previous instruction/operation.
5. Arithmetic logic unit (ALU): it is used register for implements logical and arithmetic
operations.it is also called accumulators.
6. Interrupt and index registers: It contains info about interrupts.
7. Memory Buffer Register (MBR): it is a two-way register because it contains data
which is fetched from main memory and process on CPU or waiting to store in main
memory.
31
Document Page
Conclusion
Here, I have prepared the report on "computer architecture" that is a mathematical pattern of
the different type of number system for the government-funded college. In the report, I have
also described logical gate with the truth table. Even I have also provided the detail about
system component and their interaction and Memory system. Polling and Interrupts are used
for system part, process, and peripherals connection (for sharing the information). Further, I
have given detail about the principle of process operation such as RISC and CISC. At the end
of the report, I revealed fetch-execute cycle and their steps in which it works.
I have pleasure complete this assignment successfully.
32
Document Page
References
Agarwal, T. (n.d.). What is RISC and CISC Architecture ? Edgefxkits. [online] Edgefx
Kits Official Blog. Available at: http://www.edgefxkits.com/blog/what-is-risc-and-cisc-
architecture/ [Accessed 15 Jan. 2018].
Bluitt, T. (2015). Fetch Execute Cycle – In Detail - - ppt video online download. [online]
Slideplayer. Available at: http://slideplayer.com/slide/3223680/ [Accessed 15 Jan. 2018].
Boone, E. (2015). 68HC11 Polling and Interrupts - ppt video online download. [online]
Slideplayer. Available at: http://slideplayer.com/slide/4609307/ [Accessed 15 Jan. 2018].
Chortle. (n.d.). Secondary Memory. [online] Available at:
http://chortle.ccsu.edu/java5/notes/chap01/ch01_7.html [Accessed 15 Jan. 2018].
Computerhope. (2017). What is a Sampling Rate?. [online] Available at:
https://www.computerhope.com/jargon/s/samprate.htm [Accessed 15 Jan. 2018].
Dev, k. (2009). What is CPU Register? Type of CPU Register.. [online] Slideshare.
Available at: https://www.slideshare.net/kapildev2009/cpu-register [Accessed 15 Jan.
2018].
Infocenter.arm, (2009). ARM Information Center. [online] Available at:
http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.faqs/ka3839.html
[Accessed 15 Jan. 2018].
Fairhead, H. (2015). Introduction to Boolean Logic. [online] I-programmer. Available at:
http://www.i-programmer.info/babbages-bag/235-logic-logic-everything-is-logic.html
[Accessed 15 Jan. 2018].
fileformat (n.d.). Types of Data. [online] Fileformat. Available at:
http://www.fileformat.info/mirror/egff/ch10_03.htm [Accessed 15 Jan. 2018].
Fisher, T. (2017). What Is a Hard Disk Drive (HDD) and What Does It Do?. [online]
Lifewire. Available at: https://www.lifewire.com/what-is-a-hard-disk-drive-2618152
[Accessed 15 Jan. 2018].
kashyap, A. (2016). Arbitration in computer organization. [online] Slideshare. Available
at: https://www.slideshare.net/amitkashyap12979/arbitration-in-computer-organization
[Accessed 15 Jan. 2018].
Lee, X. (2016). Unicode Basics: What's Character Set, Character Encoding, UTF-8?.
[online] Ergoemacs.org. Available at: http://ergoemacs.org/emacs/unicode_basics.html
[Accessed 15 Jan. 2018].
33
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Simplified, G. (2008). Primary Memory And Its Type. [online] Kullabs. Available at:
https://www.kullabs.com/classes/subjects/units/lessons/notes/note-detail/3572 [Accessed
15 Jan. 2018].
Slideplayer,( n.d). Important Hardware Modems (amplitude and frequency Modulation) -
ppt download. [online] Available at: http://slideplayer.com/slide/5048932/ [Accessed 15
Jan. 2018].
Thakur, D. (n.d.). Input and Output Devices. [online] Ecomputernotes. Available at:
http://ecomputernotes.com/fundamental/input-output-and-memory/list-various-input-and-
output-devices [Accessed 15 Jan. 2018].
Unicode. (2015). What is Unicode?. [online] Available at:
http://unicode.org/standard/WhatIsUnicode.html [Accessed 15 Jan. 2018].
wiseGEEK. (n.d.). What is a Pen Drive? (with pictures). [online] Available at:
http://www.wisegeek.com/what-is-a-pen-drive.htm [Accessed 15 Jan. 2018].
Zych, A. (2015). Learn How To Write Your Name In Binary Code. [online] Science
Friday. Available at: https://www.sciencefriday.com/educational-resources/write-your-
name-in-binary-code/ [Accessed 15 Jan. 2018].
34
chevron_up_icon
1 out of 35
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]