Module 1
Module 1
Module 1
MODULE - 1
Notes (as per VTU Syllabus)
V SEMESTER – B. E
Syllabus
[As per Choice Based Credit System (CBCS) scheme]
SEMESTER – V
Subject Code: 21EC52 IA Marks: 50
Number of Lecture Hours/Week: 3 Exam Marks: 50
Total Number of Lecture Hours: 40 Exam Hours 03
Credits – 04
Module – 1
Basic Structure of Computers: Basic Operational Concepts, Bus Structures, Performance – Processor Clock, Basic
Performance Equation, Clock Rate, Performance Measurement.
Text Book 1: Chapter 1 – 1.3, 1.4, 1.6 (1.6.1-1.6.4, 1.6.7), Chapter 2 – 2.2 to 2.10
Input/Output Organization: Accessing I/O Devices, Interrupts – Interrupt Hardware, Direct Memory Access,
Buses, Interface Circuits, Standard I/O Interfaces – PCI Bus, SCSI Bus, USB.
Text Books:
➢ Carl Hamacher, Zvonko Vranesic, Safwat Zaky, Computer Organization, 5th Edition, Tata McGraw Hill,
2002. (Listed topics only from Chapters 1, 2, 4, 5, 8).
➢ 2. Andrew N Sloss, Dominic System and Chris Wright, “ARM System Developers Guide”, Elsevier, Morgan
Kaufman publisher, 1st Edition, 2008.
INDEX SHEET
SL. PAGE
TOPIC
NO. NO.
VTU Syllabus 2
MODULE – 1
Basic Structure of Computers & Input/Output Organization
2 Bus Structure 6
Performance – Processor Clock, Basic Performance Equation, Clock 7
3 Rate, Performance Measurement
Machine Instructions &Programs 9
4
BASIC CONCEPTS
• Computer Architecture (CA) is concerned with the structure and behaviour of the computer.
• CA includes the information formats, the instruction set and techniques for addressing memory.
• In general covers, CA covers 3 aspects of computer-design namely:
1) Computer Hardware, 2)Instruction set Architecture and 3)Computer organization.
1. Computer Hardware
➢ It consists of electronic circuits, displays, magnetic and optical storage media and communication
facilities.
2. Instruction Set Architecture
➢ It is programmer visible machine interface such as instruction set, registers, memory organization and
exception handling.
➢ Two main approaches are 1) CISC and 2) RISC.
(CISC-Complex Instruction Set Computer, RISC-Reduced Instruction Set Computer)
3. Computer Organization
➢ It includes the high level aspects of a design, such as
→ memory-system
→ bus-structure &
→ design of the internal CPU.
➢ It refers to the operational units and their interconnections that realize the architectural specifications.
➢ It describes the function of and design of the various units of digital computer that store and process
information.
FUNCTIONAL UNITS
• A computer consists of 5 functionally independent main parts:
1) Input
2) Memory
3) ALU
4) Output &
5) Control units.
➢ At some point during execution, contents of PC are incremented to point to next instruction in the program.
Section 2:
1.2 BUS STRUCTURE
• A bus is a group of lines that serves as a connecting path for several devices.
• A bus may be lines or wires.
• The lines carry data or address or control signal.
There are 2 types of Bus structures: 1) Single Bus Structure and 2) Multiple Bus Structure.
1) Single Bus Structure
➢ Because the bus can be used for only one transfer at a time, only 2 units can actively use the bus at any
given time.
➢ Bus control lines are used to arbitrate multiple requests for use of the bus.
➢ Advantages:
1) Low cost &
2) Flexibility for attaching peripheral devices.
2) Multiple Bus Structure
➢ Systems that contain multiple buses achieve more concurrency in operations.
➢ Two or more transfers can be carried out at the same time.
➢ Advantage: Better performance.
➢ Disadvantage: Increased cost.
• The devices connected to a bus vary widely in their speed of operation.
• To synchronize their operational-speed, buffer-registers can be used.
• Buffer Registers
→ are included with the devices to hold the information during transfers.
→ prevent a high-speed processor from being locked to a slow I/O device during data transfers.
Section 3:
PERFORMANCE
• The most important measure of performance of a computer is how quickly it can execute programs.
• The speed of a computer is affected by the design of
1) Instruction-set.
2) Hardware & the technology in which the hardware is implemented.
3) Software including the operating system.
• Because programs are usually written in a HLL, performance is also affected by the compiler that translates
programs into machine language. (HLL- High LevelLanguage).
• For best performance, it is necessary to design the compiler, machine instruction set and hardware in a co-
ordinated way.
Let us examine the flow of program instructions and data between the memory & the processor.
• At the start of execution, all program instructions are stored in the main-memory.
• As execution proceeds, instructions are fetched into the processor, and a copy is placed in the cache.
• Later, if the same instruction is needed a second time, it is read directly from the cache.
• A program will be executed faster if movement of instruction/data between the main-memory and the
processor is minimizedwhich is achieved by using the cache.
• R is measured in cycles per second and Cycles per second is also called Hertz (Hz)
……(1)
Eq1 is referred to as the basic performance equation.
• To achieve high performance, the computer designer must reduce the value of T, which means reducing N
and S, and increasing R.
➢ The value of N is reduced if source program is compiled into fewer machine instructions.
➢ The value of S is reduced if instructions have a smaller number of basic steps to perform.
➢ The value of R can be increased by using a higher frequency clock.
• Care has to be taken while modifying values since changes in one parameter may affect the other.
1.3.3 CLOCK RATE
• There are 2 possibilities for increasing the clock rate R:
1) Improving the IC technology makes logic-circuits faster.
This reduces the time needed to compute a basic step. (IC-integrated circuits).
This allows the clock period P to be reduced and the clock rate R to be increased.
2) Reducing the amount of processing done in one basic step also reduces the clock period P.
• In presence of a cache, the percentage of accesses to the main-memory is small.
Hence, much of performance-gain expected from the use of faster technology can be realized.The value of T will be
reduced by same factor as R is increased.‟ S & N” are not affected.
1.3.4 PERFORMANCE MEASUREMENT
• Benchmark refers to standard task used to measure how well a processor operates.
• The Performance Measure is the time taken by a computer to execute a given benchmark.
• SPEC selects & publishes the standard programs along with their test results for different application
domains. (SPEC- System Performance Evaluation Corporation).
• SPEC Rating is given by
• SPEC rating = 50- The computer under test is 50 times as fast as reference-computer.
• The test is repeated for all the programs in the SPEC suite.Then, the geometric mean of the results is computed.
• Let SPECi = Rating for program „i' in the suite.
Overall SPEC rating for the computer is given by
where n = no. of programs in the suite.
Section 4:
MACHINE INSTRUCTIONS &PROGRAMS
MEMORY-LOCATIONS & ADDRESSES
✓ Memory consists of many millions of storage cells (flip-flops).
✓ Each cell can store a bit of information i.e. 0 or 1 (Figure 2.1).
✓ Each group of n bits is referred to as a word of information, and n is called the word length.
✓ The word length can vary from 8 to 64 bits.
✓ A unit of 8 bits is called a byte.
✓ Accessing the memory to store or retrieve a single item of information (word/byte) requires distinct
addresses for each item location. (It is customary to use numbers from 0 through 2k-1 as the
addresses of successive-locations in the memory).
✓ If 2k = no. of addressable locations;then 2k addresses constitute the address-space of the computer.
For example, a 24-bit address generates an address-space of 224 locations (16 MB).
Consider a 32-bit integer (in hex): 0x12345678 which consists of 4 bytes: 12, 34, 56, and 78.
➢ Hence this integer will occupy 4 bytes in memory.
➢ Assume, we store it at memory address starting 1000.
➢ On little-endian, memory will look like
Address Value
1000 78
1001 56
1002 34
1003 12
• For example,
➢ If the word length is 16(2 bytes), aligned words begin at byte-addresses 0, 2, 4 . . . . .
➢ If the word length is 64(2 bytes), aligned words begin at byte-addresses 0, 8, 16 . . . . .
• Words are said to have Unaligned Addresses, if they begin at an arbitrary byte-address.
MEMORY OPERATIONS
• Two memory operations are:
1) Load (Read/Fetch) &
2) Store (Write).
• The Load operation transfers a copy of the contents of a specific memory-location to the processor.The
memory contents remain unchanged.
• Steps for Load operation:
1) Processor sends the address of the desired location to the memory.
2) Processor issues „read‟ signal to memory to fetch the data.
3) Memory reads the data stored at that address.
4) Memory sends the read data to the processor.
• The Store operation transfers the information from the register to the specified memory-location.This
will destroy the original contents of that memory-location.
• Steps for Store operation are:
1) Processor sends the address of the memory-location where it wants to store data.
2) Processor issues „write‟ signal to memory to store the data.
3) Content of register(MDR) is written into the specified memory-location.
Section 5:
INSTRUCTIONS & INSTRUCTION SEQUENCING
• A computer must have instructions capable of performing 4 types of operations:
1) Data transfers between the memory and the registers (MOV, PUSH, POP, XCHG).
2) Arithmetic and logic operations on data (ADD, SUB, MUL, DIV, AND, OR, NOT).
3) Program sequencing and control (CALL.RET, LOOP, INT).
4) I/0 transfers (IN, OUT).
REGISTER TRANSFER NOTATION (RTN)
• The possible locations in which transfer of information occurs are: 1) Memory-location 2) Processor
register & 3) Registers in I/O device.
Location Hardware Binary Example Description
Address
Memory LOC, PLACE, NUM R1 = [LOC] Contents of memory-location LOCare
transferred into register R1.
Processor R0, R1 ,R2 [R3] = [R1]+[R2] Add the contents of register R1 &R2and
places their sum into R3.
I/O Registers DATAIN, DATAOUT R1 =DATAIN Contents of I/O register DATAIN are
transferred into register R1.
Program Explanation
• Consider the program for adding a list of n numbers (Figure 2.9).
• The Address of the memory-locations containing the n numbers are symbolically given as NUM1,
NUM2…..NUMn.
• Separate Add instruction is used to add each number to the contents of register R0.
• After all the numbers have been added, the result is placed in memory-location SUM.
Section 6:
ADDRESSING MODES
• The different ways in which the location of an operand is specified in an instruction are referred to as
Addressing Modes (Table 2.1).
Indirect Mode
• The EA of the operand is the contents of a register(or memory-location).
• The register (or memory-location) that contains the address of an operand is called a Pointer.
• We denote the indirection by
→ name of the register or
→ new address given in the instruction.
E.g: Add (R1),R0 ;The operand is in memory. Register R1 gives the effective-address (B) of the
operand. The data is read from location B and added to contents of register R0.
• To execute the Add instruction in fig 2.11 (a), the processor uses the value which is in register R1, asthe
EA of the operand.
• It requests a read operation from the memory to read the contents of location B. The value read isthe
desired operand, which the processor adds to the contents of register R0.
• Indirect addressing through a memory-location is also possible as shown in fig 2.11(b). In this case, the
processor first reads the contents of memory-location A, then requests a second read operation using the
value B as an address to obtain the operand.
• Fig(a) illustrates two ways of using the Index mode. In fig(a), the index register, R1, contains the address
of a memory-location, and the value X defines an offset(also called a displacement) from this address to the
location where the operand is found.
• To find EA of operand:
Eg: Add 20(R1), R2
EA=>1000+20=1020
• An alternative use is illustrated in fig(b). Here, the constant X corresponds to a memory address, and the
contents of the index register define the offset to the operand. In either case, the effective-address is the sum
of two values; one is given explicitly in the instruction, and the other is stored in a register.
Base with Index Mode
• Another version of the Index mode uses 2 registers which can be denoted as(Ri,
Rj)
• Here, a second register may be used to contain the offset X.
• The second register is usually called the base register.
• The effective-address of the operand is given by EA=[Ri]+[Rj]
• This form of indexed addressing provides more flexibility in accessing operands because
both components of the effective-address can be changed.
Base with Index & Offset Mode
• Another version of the Index mode uses 2 registers plus a constant, which can be denoted asX(Ri,
Rj)
• The effective-address of the operand is given by EA=X+[Ri]+[Rj]
• This added flexibility is useful in accessing multiple components inside each item in a record, where the
beginning of an item is specified by the (Ri, Rj) part of the addressing-mode. In other words, this mode
implements a 3-dimensional array.
RELATIVE MODE
• This is similar to index-mode with one difference:
The effective-address is determined using the PC in place of the general purpose register Ri.
• The operation is indicated as X(PC).
• X(PC) denotes an effective-address of the operand which is X locations above or below the current
contents of PC.
• Since the addressed-location is identified "relative" to the PC, the name Relative mode is associatedwith
this type of addressing.
• This mode is used commonly in conditional branch instructions.
• An instruction such as
Branch > 0 LOOP ;Causes program execution to go to the branch target locationidentified by name LOOP
if branch condition is satisfied.
ASSEMBLY LANGUAGE
• We generally use symbolic-names to write a program.
• A complete set of symbolic-names and rules for their use constitute an Assembly Language.
• The set of rules for using the mnemonics in the specification of complete instructions and programs is
called the Syntax of the language.
• Programs written in an assembly language can be automatically translated into a sequence of
machine instructions by a program called an Assembler.
• The user program in its original alphanumeric text formal is called a Source Program, and the
assembled machine language program is called an Object Program.
For example:
MOVE R0,SUM ;The term MOVE represents OP code for operation performed by instruction.
ADD #5,R3 ;Adds number 5 to contents of register R3 & puts the result back into registerR3.
ASSEMBLER DIRECTIVES
• Directives are the assembler commands to the assembler concerning the program being assembled.
• These commands are not translated into machine opcode in the object-program
• EQU informs the assembler about the value of an identifier (Figure: 2.18).
Ex: SUM EQU 200 ;Informs assembler that the name SUM should be replaced by the value 200.
• ORIGIN tells the assembler about the starting-address of memory-area to place the data block.
Ex: ORIGIN 204 ;Instructs assembler to initiate data-block at memory-locations starting from 204.
• DATAWORD directive tells the assembler to load a value into the location.
Ex: N DATAWORD 100 ;Informs the assembler to load data 100 into the memory-location N(204).
• RESERVE directive is used to reserve a block of memory.
Ex: NUM1 RESERVE 400 ;declares a memory-block of 400 bytes is to be reserved for data.
• END directive tells the assembler that this is the end of the source-program text.
• RETURN directive identifies the point at which execution of the program should be terminated.
• Any statement that makes instructions or data being placed in a memory-location may be given a
label. The label(say N or NUM1) is assigned a value equal to the address of that location.
• The assembler stores the object-program on a magnetic-disk. The object-program must be loadedinto
the memory of the computer before it is executed. For this, a Loader Program is used.
• Debugger Program is used to help the user find the programming errors.
• Debugger program enables the user
→ to stop execution of the object-program at some points of interest &
→ to examine the contents of various processor-registers and memory-location.
Section 7:
BASIC INPUT/OUTPUT OPERATIONS
• Consider the problem of moving a character-code from the keyboard to the processor (Figure: 2.19).For
this transfer, buffer-register DATAIN & a status control flags(SIN) are used.
• When a key is pressed, the corresponding ASCII code is stored in a DATAIN register associated withthe
keyboard.
➢ SIN=1 → When a character is typed in the keyboard. This informs the processor that a valid
character is in DATAIN.
➢ SIN=0 → When the character is transferred to the processor.
• An analogous process takes place when characters are transferred from the processor to the display.For
this transfer, buffer-register DATAOUT & a status control flag SOUT are used.
➢ SOUT=1 → When the display is ready to receive a character.
➢ SOUT=0 → When the character is being transferred to DATAOUT.
• The buffer registers DATAIN and DATAOUT and the status flags SIN and SOUT are part of circuitry
• Some address values are used to refer to peripheral device buffer-registers such as DATAIN &
DATAOUT.
• No special instructions are needed to access the contents of the registers; data can be transferred
between these registers and the processor using instructions such as Move, Load or Store.
• For example, contents of the keyboard character buffer DATAIN can be transferred to register R1 in the
processor by the instruction
MoveByte DATAIN,R1
• The MoveByte operation code signifies that the operand size is a byte.
• The Testbit instruction tests the state of one bit in the destination, where the bit position to betested
is indicated by the first operand.
STACKS
• A stack is a special type of data structure where elements are inserted from one end and elementsare
deleted from the same end. This end is called the top of the stack (Figure: 2.14).
• The various operations performed on stack:
1) Insert: An element is inserted from top end. Insertion operation is called push operation.
2) Delete: An element is deleted from top end. Deletion operation is called pop operation.
• A processor-register is used to keep track of the address of the element of the stack that is at the topat any
given time. This register is called the Stack Pointer (SP).
• If we assume a byte-addressable memory with a 32-bit word length,
1) The push operation can be implemented as
Subtract #4, SP Move
NEWITEM, (SP)
2) The pop operation can be implemented as
Move (SP), ITEM
Add #4, SP
QUEUE
• Data are stored in and retrieved from a queue on a FIFO basis.
• Difference between stack and queue?
1) One end of the stack is fixed while the other end rises and falls as data are pushed and popped.
2) In stack, a single pointer is needed to keep track of top of the stack at any given time.
In queue, two pointers are needed to keep track of both the front and end for removal and
insertion respectively.
3) Without further control, a queue would continuously move through the memory of acomputer in the
direction of higher addresses. One way to limit the queue to a fixed region in memory is to use a circular
buffer.
SUBROUTINES
• A subtask consisting of a set of instructions which is executed many times is called a Subroutine.
• A Call instruction causes a branch to the subroutine (Figure: 2.16).
• At the end of the subroutine, a return instruction is executed
• Program resumes execution at the instruction immediately following the subroutine call
• The way in which a computer makes it possible to call and return from subroutines is referred to asits
Subroutine Linkage method.
• The simplest subroutine linkage method is to save the return-address in a specific location, whichmay be
a register dedicated to this function. Such a register is called the Link Register.
• When the subroutine completes its task, the Return instruction returns to the calling-program by
branching indirectly through the link-register.
• The Call Instruction is a special branch instruction that performs the following operations:
→ Store the contents of PC into link-register.
→ Branch to the target-address specified by the instruction.
• The Return Instruction is a special branch instruction that performs the operation:
→ Branch to the address contained in the link-register.
Section 8:
LOGIC INSTRUCTIONS
• Logic operations such as AND, OR, and NOT applied to individual bits.
• These are the basic building blocks of digital-circuits.
• This is also useful to be able to perform logic operations is software, which is done using instructions that apply these operations to
all bits of a word or byte independently and in parallel.
• For example, the instruction
Not dst
ROTATE OPERATIONS
• In shift operations, the bits shifted out of the operand are lost, except for the last bit shifted outwhich is
retained in the Carry-flag C.
• To preserve all bits, a set of rotate instructions can be used.
• They move the bits that are shifted out of one end of the operand back into the other end.
• Two versions of both the left and right rotate instructions are usually
provided.In one version, the bits of the operand is simply rotated. In the
other version, the rotation includes the C flag.
Section 9:
• A single bus-structure can be used for connecting I/O-devices to a computer (Figure 7.1).
Dept. of ECE/SJBIT Page 25
Computer Organization & ARM Microcontrollers 21EC52
There are 2 ways to deal with I/O-devices: 1) Memory-mapped I/O & 2) I/O-mapped I/O.
1) Memory-Mapped I/O
➢ Memory and I/O-devices share a common address-space.
➢ Any data-transfer instruction (like Move, Load) can be used to exchange information.
➢ For example,
Move DATAIN, R0; This instruction sends the contents of location DATAIN to register R0.
Here, DATAIN - address of the input-buffer of the keyboard.
2) I/O-Mapped I/O
➢ Memory and I/0 address-spaces are different.
➢ A special instructions named IN and OUT are used for data-transfer.
➢ Advantage of separate I/O space: I/O-devices deal with fewer address-lines.
Section 10:
INTERRUPTS
• There are many situations where other tasks can be performed while waiting for an I/O device to
become ready.
• A hardware signal called an Interrupt will alert the processor when an I/O device becomes ready.
• Interrupt-signal is sent on the interrupt-request line.
• The processor can be performing its own task without the need to continuously check the I/O-device.
• The routine executed in response to an interrupt-request is called ISR.
• The processor must inform the device that its request has been recognized by sending INTA signal.
(INTR - Interrupt Request, INTA - Interrupt Acknowledge, ISR - Interrupt Service Routine)
• For example, consider COMPUTE and PRINT routines (Figure 3.6).
INTERRUPT HARDWARE
• Most computers have several I/O devices that can request an interrupt.
• A single interrupt-request (IR) line may be used to serve n devices (Figure 4.6).
• All devices are connected to IR line via switches to ground.
• To request an interrupt, a device closes its associated switch.
• Thus, if all IR signals are inactive, the voltage on the IR line will be equal to Vdd.
POLLING
• Information needed to determine whether device is requesting interrupt is available in status-register
• Following condition-codes are used:
➢ DIRQ-Interrupt-request for display.
➢ KIRQ - Interrupt-request for keyboard.
➢ KEN - keyboard enable.
➢ DEN - Display Enable.
➢ SIN, SOUT - status flags.
• For an input device, SIN status flag in used.
SIN = 1 when a character is entered at the keyboard.
SIN = 0 when the character is read by processor.
IRQ=1 when a device raises an interrupt-requests (Figure 4.3).
• Simplest way to identify interrupting-device is to have ISR poll all devices connected to bus.
• The first device encountered with its IRQ bit set is serviced.
• After servicing first device, next requests may be serviced.
• Advantage: Simple & easy to implement.
Disadvantage: More time spent polling IRQ bits of all devices.
VECTORED INTERRUPTS
• A device requesting an interrupt identifies itself by sending a special-code to processorover bus.
• Then, the processor starts executing the ISR.
• The special-code indicates starting-address of ISR.
• The special-code length ranges from 4 to 8 bits.
• The location pointed to by the interrupting-device is used to store the staring address toISR.
• The staring address to ISR is called the interrupt vector.
• Processor
→ loads interrupt-vector into PC &
→ executes appropriate ISR.
• When processor is ready to receive interrupt-vector code, it activates INTA line.
• Then, I/O-device responds by sending its interrupt-vector code & turning off the INTRsignal.
• The interrupt vector also includes a new value for the Processor Status Register.
INTERRUPT NESTING
• A multiple-priority scheme is implemented by using separate INTR & INTA lines foreach device
• Each INTR line is assigned a different priority-level (Figure 4.7).
• Priority-level of processor is the priority of program that is currently being executed.
• Processor accepts interrupts only from devices that have higher-priority than its own.
• At the time of execution of ISR for some device, priority of processor is raised to that ofthe device.
• Thus, interrupts from devices at the same level of priority or lower are disabled.
Privileged Instruction
• Processor's priority is encoded in a few bits of PS word. (PS Processor-Status).
• Encoded-bits can be changed by Privileged Instructions that write into PS.
• Privileged-instructions can be executed only while processor is running in SupervisorMode.
• Processor is in supervisor-mode only when executing operating-system routines.
Privileged Exception
• User program cannot
→ accidently or intentionally change the priority of the processor &
→ disrupt the system-operation.
• An attempt to execute a privileged-instruction while in user-mode leads to a PrivilegedException.
SIMULTANEOUS REQUESTS
• The processor must have some mechanisms to decide which request to servicewhen
simultaneous requests arrive.
• INTR line is common to all devices (Figure 4.8a).
• INTA line is connected in a daisy-chain fashion.
• INTA signal propagates serially through devices.
• When several devices raise an interrupt-request, INTR line is activated.
• Processor responds by setting INTA line to 1. This signal is received by device 1.
• Device-1 passes signal on to device 2 only if it does not require any service.
• If device-1 has a pending-request for interrupt, the device-1
→ blocks INTA signal &
→ proceeds to put its identifying-code on data-lines.
• Device that is electrically closest to processor has highest priority.
• Advantage: It requires fewer wires than the individual connections.
Arrangement of Priority Groups
• Here, the devices are organized in groups & each group is connected at a differentpriority level.
• Within a group, devices are connected in a daisy chain. (Figure 4.8b).
EXCEPTIONS
• An interrupt is an event that causes
→ execution of one program to be suspended &
→ execution of another program to begin.
• Exception refers to any event that causes an interruption. For ex: I/O interrupts.
1. Recovery from Errors
• These are techniques to ensure that all hardware components are operating properly.
• For ex: Many computers include an ECC in memory which allows detection of errors in
stored-data. (ECC Error Checking Code, ESR Exception Service Routine).
• If an error occurs, control-hardware
→ detects the errors &
→ informs processor by raising an interrupt.
• When exception processing is initiated (as a result of errors), processor.
→ suspends program being executed &
→ starts an ESR. This routine takes appropriate action to recover from the error.
2. Debugging
• Debugger
→ is used to find errors in a program and
→ uses exceptions to provide 2 important facilities: i) Trace & ii) Breakpoints
i) Trace
• When a processor is operating in trace-mode, an exception occurs after executionof every
instruction(using debugging-program as ESR).
• Debugging-program enables user to examine contents of registers, memory-locations andso on.
• On return from debugging-program, next instruction in program being debugged isexecuted, then
debugging-program is activated again.
• The trace exception is disabled during the execution of the debugging-program.
ii) Breakpoints
• Here, the program being debugged is interrupted only at specific points selected by user.
• An instruction called Trap (or Software interrupt) is usually provided for this purpose.
• When program is executed & reaches breakpoint, the user can examine memory ®ister
contents.
3. Privilege Exception
Section 11:
Otherwise, controller performs a write-operation (i.e. it transfers data from I/O to memory).
If Done=1, the controller
•
→ has completed transferring a block of data and
→ is ready to receive another command. (IE Interrupt Enable).
• If IE=1, controller raises an interrupt after it has completed transferring a block of data.
• If IRQ=1, controller requests an interrupt.
• Requests by DMA devices for using the bus are always given higher priority thanprocessor requests.
• There are 2 ways in which the DMA operation can be carried out:
1) Processor originates most memory-access cycles.
➢ DMA controller is said to "steal" memory cycles from processor.
➢ Hence, this technique is usually called Cycle Stealing.
2) DMA controller is given exclusive access to main-memory to transfer a block of data
without any interruption. This is known as Block Mode (or burst mode).
BUS ARBITRATION
• The device that is allowed to initiate data-transfers on bus at any given time is called bus-master.
• There can be only one bus-master at any given time.
• Bus Arbitration is the process by which
→ next device to become the bus-master is selected &
→ bus-mastership is transferred to that device.
• The two approaches are:
1) Centralized Arbitration: A single bus-arbiter performs the required arbitration.
2) Distributed Arbitration: All devices participate in selection of next bus-master.
• A conflict may arise if both the processor and a DMA controller or two DMAcontrollers try
to use thebus at the same time to access the main-memory.
• To resolve this, an arbitration procedure is implemented on the bus to coordinatethe activities
of alldevices requesting memory transfers.
• The bus arbiter may be the processor or a separate unit connected to the bus.
CENTRALIZED ARBITRATION
• A single bus-arbiter performs the required arbitration (Figure: 4.20).
• Normally, processor is the bus-master.
• Processor may grant bus-mastership to one of the DMA controllers.
• A DMA controller indicates that it needs to become bus-master by activating BR line.
• The signal on the BR line is the logical OR of bus-requests from all devices connected toit.
• Then, processor activates BG1 signal indicating to DMA controllers to use bus when it becomes free.
• BG1 signal is connected to all DMA controllers using a daisy-chain arrangement.
• If DMA controller-1 is requesting the bus, Then, DMA controller-1 blocks propagation of grant-signal
to other devices. Otherwise, DMA controller-1 passes the grant downstream by asserting BG2.
• Current bus-master indicates to all devices that it is using bus by activating BBSY line.
• The bus-arbiter is used to coordinate the activities of all devices requesting memory transfers.
• Arbiter ensures that only 1 request is granted at any given time according to a priority scheme. (BR Bus-
Request, BG Bus-Grant, BBSY Bus Busy).
• The timing diagram shows the sequence of events for the devices connected to theprocessor.
• DMA controller-2
→ requests and acquires bus-mastership and
→ later releases the bus. (Figure: 4.21).
• After DMA controller-2 releases the bus, the processor resources bus-mastership.
DISTRIBUTED ARBITRATION
• All device participate in the selection of next bus-master (Figure 4.22).
• Each device on bus is assigned a 4-bit identification number (ID).
• When 1 or more devices request bus, they
→ assert Start-Arbitration signal &
→ place their 4-bit ID numbers on four open-collector lines ARB 0 through ARB 3
.
• A winner is selected as a result of interaction among signals transmitted over these lines.
• Net-outcome is that the code on 4 lines represents request that has the highest ID number.
• Advantage:
This approach offers higher reliability since operation of bus is not dependent on anysingle device.
For example:
➢ Assume 2 devices A & B have their ID 5 (0101), 6 (0110) and their code is 0111.
➢ Each device compares the pattern on the arbitration line to its own ID starting fromMSB.
➢ If the device detects a difference at any bit position, it disables the drivers at that bitposition.
➢ Driver is disabled by placing ”0” at the input of the driver.
➢ In e.g. “A” detects a difference in line ARB1, hence it disables the drivers on linesARB1 &
ARB0.
➢ This causes pattern on arbitration-line to change to 0110. Thismeans that “B” has
won contention.
Section 12:
BUS
• Bus → is used to inter-connect main-memory, processor & I/O-devices
→ includes lines needed to support interrupts & arbitration.
• Primary function: To provide a communication-path for transfer of data.
• Bus protocol is set of rules that govern the behavior of various devices connected to thebuses.
• Bus-protocol specifies parameters such as:
→ asserting control-signals
→ timing of placing information on bus
→ rate of data-transfer.
• A typical bus consists of 3 sets of lines:
1) Address,
2) Data &
3) Control lines.
• Control-signals
→ specify whether a read or a write-operation is to be performed.
→ carry timing information i.e. they specify time at which I/O-devices place dataon the bus.
Dept. of ECE/SJBIT Page 37
Computer Organization & ARM Microcontrollers 21EC52
SYNCHRONOUS BUS
• All devices derive timing-information from a common clock-line.
• Equally spaced pulses on this line define equal time intervals.
• During a ”bus cycle‟, one data-transfer can take place.
A sequence of events during a read-operation
• At time t0, the master (processor)
→ places the device-address on address-lines &
→ sends an appropriate command on control-lines (Figure 7.3).
• The command will
→ indicate an input operation &
→ specify the length of the operand to be read.
• Information travels over bus at a speed determined by physical & electricalcharacteristics.
• Clock pulse width(t1-t0) must be longer than max. propagation-delay b/w devicesconnected to bus.
• The clock pulse width should be long to allow the devices to decode the address &control
signals.
• The slaves take no action or place any data on the bus before t1.
• Information on bus is unreliable during the period t0 to t1 because signals are changingstate.
• Slave places requested input-data on data-lines at time t1.
• At end of clock cycle (at time t2), master strobes (captures) data on data-lines into itsinput-buffer
• For data to be loaded correctly into a storage device, data must be available at inputof that device
for a period greater than setup-time of device.
• The picture shows two views of the signal except the clock (Figure 7.4).
• One view shows the signal seen by the master & the other is seen by the salve.
• Master sends the address & command signals on the rising edge at the beginning of clockperiod (t0).
• These signals do not actually appear on the bus until tam.
• Sometimes later, at tAS the signals reach the slave.
• The slave decodes the address.
• At t1, the slave sends the requested-data.
• At t2, the master loads the data into its input-buffer.
• Hence the period t2, tDM is the setup time for the master‟s input-buffer.
• The data must be continued to be valid after t2, for a period equal to the hold time of thatbuffers.
Disadvantages
• The device does not respond.
• The error will not be detected.
Multiple Cycle Transfer for Read-operation
During, clock cycle-1, master sends address/command info the bus requesting a “read‟operation.
•
The slave receives & decodes address/command information (Figure 7.5).
•
At the active edge of the clock i.e. the beginning of clock cycle-2, it makesaccession to
•
respond immediately.
• The data become ready & are placed in the bus at clock cycle-3.
• At the same times, the slave asserts a control signal called slave-ready.
• The master strobes the data to its input-buffer at the end of clock cycle-3.
• The bus transfer operation is now complete.
• And the master sends a new address to start a new transfer in clock cycle4.
• The slave-ready signal is an acknowledgement from the slave to the master.
ASYNCHRONOUS BUS
• This method uses handshake-signals between master and slave for coordinating data-transfers.
• There are 2 control-lines:
1) Master-Ready (MR) is used to indicate that master is ready for a transaction.
2) Slave-Ready (SR) is used to indicate that slave is ready for a transaction.
• A change of state is one signal is followed by a change is the other signal.Hence this
scheme iscalled as Full Handshake.
• Advantage: It provides the higher degree of flexibility and reliability.
INTERFACE-CIRCUITS
• An I/O Interface consists of the circuitry required to connect an I/O device to acomputer-bus.
• On one side of the interface, we have bus signals.
On the other side, we have a data path with its associated controls to transferdata between
theinterface and the I/O device known as port.
• Two types are:
1. Parallel Port transfers data in the form of a number of bits (8 or 16)simultaneously
to orfrom the device.
2. Serial Port transmits and receives data one bit at a time.
• Communication with the bus is the same for both formats.
• The conversion from the parallel to the serial format, and vice versa, takes placeinside the
interface-circuit.
• In parallel-port, the connection between the device and the computer uses
→ a multiple-pin connector and
→ a cable with as many wires.
• This arrangement is suitable for devices that are physically close to the computer.
• In serial port, it is much more convenient and cost-effective where longer cables areneeded.
PARALLEL-PORT
KEYBOARD INTERFACED TO PROCESSOR
INPUT-INTERFACE-CIRCUIT
Output-lines of DATAIN are connected to the data-lines of bus by means of 3-state drivers (Fig 4.29).
• Drivers are turned on when
→ processor issues a read signal and
→ address selects DATAIN.
• SIN signal is generated using a status-flag circuit (Figure 4.30).
SIN signal is connected to line D0 of the processor-bus using a 3-state driver.
• Address-decoder selects the input-interface based on bits A1 through A31.
• Bit A0 determines whether the status or data register is to be read, when Master-ready is active.
• Processor activates the Slave-ready signal, when either the Read-status or Read-data is equal to
1.
→ Address-lines
→ Control or R/W line
→ Master-Ready signal and
→ Slave-Ready signal.
• On the keyboard-side of the interface, we have:
→ Encoder-circuit which generates a code for the key pressed.
→ Debouncing-circuit which eliminates the effect of a key.
→ Data-lines which contain the code for the key.
→ Valid line changes from 0 to 1 when the key is pressed. This causes the code to be loaded
into DATAIN and SIN to be set to 1.
Data-lines P7 through PO can be used for either input or output purposes (Figure 4.34).
• For increased flexibility,
→ some lines can be used as inputs and
→ some lines can be used as outputs.
• The DATAOUT register is connected to data-lines via 3-state drivers that are controlled by a DDR.
• The processor can write any 8-bit pattern into DDR. (DDR Data Direction Register).
• If DDR=1,
Then, data-line acts as an output-line;
Otherwise, data-line acts as an input-line.
• Two lines, C1 and C2 are used to control the interaction between interface-circuit and I/0 device.
Two lines, C1 and C2 are also programmable.
• Line C2 is bidirectional to provide different modes of signaling, including the handshake.
• The Ready and Accept lines are the handshake control lines on the processor-bus side.
Hence, the Ready and Accept lines can be connected to Master-ready and Slave-ready.
• The input signal My-address should be connected to the output of an address-decoder.
The address-decoder recognizes the address assigned to the interface.
• There are 3 register select lines: RS0-RS2.
Three register select lines allows up to eight registers in the interface.
• An interrupt-request INTR is also provided.
INTR should be connected to the interrupt-request line on the computer-bus.
Section 13
STANDARD I/O INTERFACE
• Consider a computer system using different interface standards.
• Let us look in to Processor bus and Peripheral Component Interconnect (PCI) bus (Figure4.38).
• These two buses are interconnected by a circuit called Bridge.
• The bridge translates the signals and protocols of one bus into another.
• The bridge-circuit introduces a small delay in data transfer between processor and thedevices.
•IDE (Integrated Device Electronics) disk is compatible with ISA which showsthe connection
to an Ethernet.
PCI
• PCI is developed as a low cost bus that is truly processor independent.
• PCI supports high speed disk, graphics and video devices.
• PCI has plug and play capability for connecting I/O devices.
• To connect new devices, the user simply connects the device interface board to the bus.
• Because of these various options, SCSI connector may have 50, 68 or 80 pins. The data transfer
rate ranges from 5MB/s to 160MB/s 320Mb/s, 640MB/s. The transfer rate depends on,
1) Length of the cable
2) Number of devices connected.
• To achieve high transfer rate, the bus length should be 1.6m for SEsignaling and 12m for
LVD signaling.
• The SCSI bus us connected to the processor-bus through the SCSIcontroller. The
data are stored on a disk in blocks called sectors.
Each sector contains several hundreds of bytes. These data will not bestored in contiguous
memory-location.
• SCSI protocol is designed to retrieve the data in the first sector or any other selectedsectors.
• Using SCSI protocol, the burst of data are transferred at high speed.
• The controller connected to SCSI bus is of 2 types. They are1) Initiator * 2) Target
1) Initiator
➢ It has the ability to select a particular target & to send commandsspecifying
the operation tobe performed.
➢ They are the controllers on the processor side.
2) Target
➢ The disk controller operates as a target.
➢ It carries out the commands it receive from the initiator.
Dept. of ECE/SJBIT Page 48
Computer Organization & ARM Microcontrollers 21EC52
1) Arbitration
• When the –BSY signal is in inactive state,
→ the bus will be free &
→ any controller can request the use of bus.
• SCSI uses distributed arbitration scheme because
each controller may generate requests at the same time.
• Each controller on the bus is assigned a fixed priority.
• When –BSY becomes active, all controllers that are requesting the bus
→ examines the data-lines &
→ determine whether highest priority device is requesting bus at thesame time.
• The controller using the highest numbered line realizes that it has won the arbitration-process.
• At that time, all other controllers disconnect from the bus & wait for –BSY to becomeinactive again.
2) Information Transfer
• The information transferred between two controllers may consist of
→ commands from the initiator to the target
→ status responses from the target to the initiator or
→ data-transferred to/from the I/0 device.
• Handshake signaling is used to control information transfers, with the targetcontroller taking
the roleof the bus-master.
3) Selection
• Here, Device
Dept. of ECE/SJBIT Page 50
Computer Organization & ARM Microcontrollers 21EC52
The data generated from keyboard depends upon the speed of the humanoperator which
is about 100 bytes/sec.
must beconverted into digital form before it can be handledby the computer.
➢ This is accomplished by sampling the analog signal periodically.
➢ The sampling process yields a continuous stream of digitized samples that arrive at
regular intervals, synchronized with the sampling clock. Such a stream is called isochronous
(i.e.) successive events are separated by equal period of time.
➢ If the sampling rate in „S‟ samples/sec then the maximum frequency captured by
sampling process is s/2.
➢ A standard rate for digital sound is 44.1 KHz.
USB ARCHITECTURE
• To accommodate a large number of devices that can be added or removed at anytime, the USB
hasthe tree structure as shown in the figure 7.17.
• Each node of the tree has a device called a Hub.
• A hub acts as an intermediate control point between the host and the I/O devices.
• At the root of the tree, a Root Hub connects the entire tree to the host computer.
• The leaves of the tree are the I/O devices being served (for example, keyboard orspeaker).
• A hub copies a message that it receives from its upstream connection to all itsdownstream ports.
• As a result, a message sent by the host computer is broadcast to all I/O devices, but onlytheaddressed-
device will respond to that message.
USB ADDRESSING
• Each device may be a hub or an I/O device.
• Each device on the USB is assigned a 7-bit address.
• This address
→ is local to the USB tree and
→ is not related in any way to the addresses used on the processor-bus.
• A hub may have any number of devices or other hubs connected to it, andaddresses are
assigned arbitrarily.
• When a device is first connected to a hub, or when it is powered-on, it has the address 0.
• The hardware of the hub detects the device that has been connected, and itrecords this
fact as partof its own status information.
• Periodically, the host polls each hub to
USB PROTOCOLS
• All information transferred over the USB is organized in packets.
• A packet consists of one or more bytes of information.
• There are many types of packets that perform a variety of control functions.
• The information transferred on USB is divided into 2 broad categories: 1) Control and 2)Data.
• Control packets perform tasks such as
→ addressing a device to initiate data transfer.
→ acknowledging that data have been received correctly or
→ indicating an error.
• Data-packets carry information that is delivered to a device.
• A packet consists of one or more fields containing different kinds of information.
• The first field of any packet is called the Packet Identifier (PID) whichidentifies type
of that packet.
• They are transmitted twice.
1) The first time they are sent with their true values and
2) The second time with each bit complemented.
• The four PID bits identify one of 16 different packet types.
• Some control packets, such as ACK (Acknowledge), consist only of the PID byte. Control packets used
for controlling data transfer operations are called Token Packets