0 ratings 0% found this document useful (0 votes) 43 views 5 pages Puter Architecture
The document discusses various instruction set architectures (ISAs) including CISC, RISC, and EPIC, highlighting their characteristics and examples of processors. It also covers the concept of interrupts, detailing types such as hardware and software interrupts, and their role in communication between I/O devices and the processor. Additionally, it explains the process of data transfer between input/output devices and the processor through an interface unit.
AI-enhanced title and description
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items
Save 4.Computer Architecture For Later Chapter
Computer Architecture
Instruction Set
An instruction set also called Instruction Set Architecture
(ISA) is a group of commands for a CPU in machine
language. The term can refer to all possible instructions
for a CPU or a subset of instructions to enhance its
performance in certain situations.
Ingeneral, ISA defines the supported instructions, data
types, registers, the hardware support for managing
main memory, fundamental features (such as the
‘memory consistency, addressing modes, virtual
memory) and I/O model of family of implementations of
the ISA.
Following are the commonly known instruction sets :
@ csc (i) RISC (ii) EPIC
Complex Instruction Set
Computing/Computer (CISC)
Itisa computer architecture in which single instruction,
can execute several low-level operations (such as load
from memory, an arithmetic operation and a memory
store) or are capable of multistep operations or
addressing modes within single instructions.
The CISC architecture contains a large set of computer
instructions that range from very simple to very complex
and specialised. The primary goal of CISC architecture is
tocomplete a task in as few lines of assembly as possible.
This is achieved by building processor hardware that is
capable of understanding and executing a series of
operations, e.g. we want to find the product of two
numbers-one stored in location 2 : 3 and another stored
in location 5 : 2 and then store the product back in
location 2 : 3.
For this particular task, a CISC processor would come
prepared with a specific instruction (ie. MULT).
When executed, this instruction loads the two values into
separate registers, multiplies the operands in the
execution unit and then stores the product in the
appropriate registers.
Thus, the entire task of multiplying two numbers can be
completed with one instruction.
MULT 2:3, 5:2
Some characteristics of CISC are given below :
(@) A large number of instructions- typically from 100
to 250 instructions and of variable nature.
(ii) A large variety of addressing modes- typically 5 to
20 different modes and more data type.
(iii) Variable-length instruction formats.
(iv) Some instructions that perform specialised tasks
and are used infrequently.
(v) It is used for instructions that manipulate operands
in memory.
(vi) A small number of general purpose registers.
Examples of CISC processors are Intel 386, Intel 486,
Pentium Pro, Pentium LI, Motorola's 68040 etc.
Reduced Instruction Set
Computing/Computer (RISC)
RISC microprocessor has a relatively limited number of
instructions. It is designed to perform a smaller number
of types of computer instructions, so that it can operate
ata higher speed (perform more million of instructions
pper second).
This concept was developed with the belief that a
computer uses only 20% of the instructions, making the
other 80% unnecessary.
‘A processor based on this concept would use few
instructions, By reducing the number of instructions to
only those most frequently used, the computer would get
more work done in a shorter amount of time.
RISC processors only use simple instructions that can be
executed within one clock cycle. Thus, the MULT
command described above could be divided into three&
Separate commands: LOAD which moves data from the
memory bank to register, PROD which finds the product
of two operands located within the register and STORE
which moves data from a register to the memory banks.
In order to perform the exact series of steps described in
the CISC approach, a programmer would need to code
four lines of assembly :
LOAD A, 2:3
LOAD B, 5:2
PROD A, B
STORE 2:3, A
‘Some characteristics of RISC are given below :
(j) Relatively few instructions and few addressing
modes
(ii) For executing each instruction in a computer, the
RISC processors requires one CPI and each CPI
includes fetch, decode and execute method applied
{in computer instruction.
(iii) Simple and limited instruction reduces the
execution time of a process in a RISC.
* Transistors used for storing complex instructions
+ small code sizes
+ Emphasies on Hardware
«Instructions are of complex nature. Nature thus
offers complex instruction decoding.
‘As size of instructions here is variable thus more than
‘one clock cycle may be used for instruction executing.
(iv) The pipelining technique is used in the RISC
processors to execute multiple parts or stages of
instructions to perform more efficiently.
(v) RISC processors are optimised with multiple
registers that can be used to store instruction and
quickly respond to the computer and minimise
interaction with computer memory.
(vi) Memory access limited to load and store
instructions.
(vii) All operations are done within the register of the
CPU.
(viii) Fixed-length and easily-decoded instruction set.
(i) Single cycle instruction execution.
(x) Spends more transistors on memory registers large
code sizes.
Emphasize on Software
Examples of RISC processors are IBM RS 6000, MC88100,
DEC's Alpha 21064, 21164, 21264 processors etc.
Prep Guide MAH-MCA CET
Explicitly Parallel Instruction
Computing/Computer (EPIC)
EPIC refers to architecture in which features are
provided to facilitate compiler enhancements of
Instruction Level Parallelism (ILP) in all programs, while
keeping hardware complexity relatively low.
Using ILP enhancement techniques such as speculation
and prediction, the compiler identifies the operation that
can execute in parallel in each cycle and communicates a
plan of execution to the hardware.
Some characteristics of EPIC are given below :
(i) Uses parallel instructions.
(ii) Programs must be written using sequential
semantics with explicitly laid out parallelism.
ii) Compiler plays the key role in designing the plan of
execution.
(iv) The architecture provides the requisite support to
the compiler to design the plan of execution
successfully.
(v) The architecture provides the mechanisms to
communicate the compiler’s plan of execution to the
hardware.
Examples of EPIC processors are Intel IA-64, Itanium
processors etc.
Interrupt
An interrupt is a signal emitted by a device (either
hardware or software) attached to a computer or from a
program within the computer. It requires the operating
system to stop and figure out what to do next.
An interrupt temporarily stops or terminates a service or
a current process Most I/O devices have a bus control
line called Interrupt Service Routine (ISR) for this
purpose. Today almost all computing system are
interrupt driven. It means that they follow the list of
computer instructions in a program and run the
instructions until they get to the end or until they sense
an interrupt signal.
If the latter event happens, the computer either resumes
running the current program or begins running another
program. In either case, it must stop operations while
deciding on the next action. To do this and to work on
other programs, the OS uses pauses in operations.
When the device processor handles interrupts, it informs
the device sending the signal that the Interrupt Request
(IRQ) has been recognised. Then the device stop sending
the IRQ signal.Computer Concepts Computer Architecture
Types of Interrupt
‘There are v0 types of interrupt as follows
() Hardware interrupt
‘This interrupt is an electronic signal from an external
hardware device that indicates it need attention from the
0S. For example, moving a mouse or pressing a
keyboard key. In this example the processor must stop to
read the mouse position or key stroke at that instant. In.
this type interrupt, all devices are connected to the
Interrupt Request Line (IRL).
Typically, a hardware IRQ has a value that associates it
with a particular device. This makes it possible for the
processor to determine which device is requesting
service by raising the IRQ and then provide service
accordingly.
Hardtware interrupt is classified into three types as :
(a) Maskable Interrupt Ina processor, an internal
interrupt mask register selectively enables and
disables hardware requests. When the mask bit is
set, the interrupt is enabled. When it is clear, the
interrupt is disabled. Signals that are affected by the
mask are maskable interrupts.
(b) Non-maskable Interrupt In some cases, the
interrupt mask cannot be disabled so it does not
affect some interrupt signals. These are
non-maskable interrupts and are usually high
priority events that cannot be ignored.
(©) Spurious Interrupt Also known as a phantom or
ghost interrupt, a spurious interrupt is a type of
hardware interrupt for which no source can be
found. These interrupts are difficult to identify if a
system misbehaves. If the ISR does not account for
the possibility of such interrupts, it may result ina
system deadlock.
() Software Interrupt
A software interrupt occurs when an application
program terminates or requests certain services from the
0S. Usually, the processor requests a software interrupt
when certain conditions are met by executing a special
instruction.
‘This instruction invokes the interrupt and functions like
a subroutine call, Software interrupts are commonly
used when the system interacts with device drivers or
when a program requests OS services.
&
Software interupts may also be unexpectedly triggered
by program execution errors. These interrupts are
typically called traps or exceptions.
Communication between Processor
and I/O Devices
‘The Communication between I/O devices and the
processor of the computer system is implemented using
an interface unit. In a computer system, data is
transferred from an input device to the processor and
from the processor to an output device.
While transferring data from 1/O devices, some steps are
performed follows as
‘© The data is to be transferred is placed on the data bus,
by the input devices which transfer single byte of data
ata time.
‘ The input devices then issue the data valid signal
through the devices control bus to the data register,
including that the data is available on the data bus.
* As the data register, now holds the data for flag bit of
the same register in the interface unit.
* The processor now issue an I/O read signal to the data
registers in the interface unit.
© The data register then places the data on the data bus
connected to the processor of the computer system.
While transferring data to output devices, some steps
are performed as
# The processor laces the data that needs to be
transferred on the data bus connected to the data
register of the interface unit.
© The CPU also places the address of the output devices
on the devices address bus.
© After placing the address and data on the appropriate
buses, CPU issue the I/O write signal which writes the
data on the data register.
*# The data register of the interface unit issue a data
accepted signal through the control bus to the
processer.
© The interface unit then places the data stored in the
data register on to the data bus connected to the device
controller of the output devices.
‘* The output devices then receive the data and sends
acknowledgment signal to the processor.EXERCISES
= Chapter Challenges
4. A/AM sesosesves 8 @ group of commands for a CPU
in machine language.
(a) Instruction set () Interrupt
(PCL (@) Deadlock
2. Which of the following architecture contains a
large set of computer instructions that range from
very simple to very complex and specialised?
(a) RISC @)cIsc
(© EPIC (@) None of these
3. Example of ..........» processors are IBM RS 6000,
MC 85100, DEC’s Alpha 21064, 21164, 21264
processors etc.
(a) CISC (b) RISC
(©) EPIC (@) None of these
4. It is designed to perform a smaller number of
types of computer instructions, so that it can
operate at a high speed.
(a) CISC (b) RISC
5. RISC processors only use simple instructions that
can be executed within
(@) access time (©) one bit
(©) one clock per cycle (d) All of these
6. Which of the following is a signal emitted by a
device attached to a computer or from a program
within the computer?
(a) Instruction set (b) Scheduling
(©) Paging (@) Interrupt
7. This interrupt is an electronic signal from an
external hardware device that indicates it needs
attention from the OS.
(@) Software interrupt
(©) Normal interrupt
8. Which of the following is/are type(s) of hardware
interrupt?
(a) Maskable interrupt
(©) Non-maskable interrupt
(©) Spurious interrupt
(@) All of the above
(©) Interrupt (4) Bus
(b) Hardware interrupt
(4) Driver interrupt
9, Signals that are affected by the mask are called
(a) Maskable interrupt
(@) Normal interrupt
10. If ISR does not account for the possibility of such
interrupt. Which type of interrupt may result in a
system deadlock?
(@) Maskable interrupt
(©) Non-maskable interrupt
(©) Spurious interrupt
(4) Normal interrupt
11. Which interrupt occurs when an application
program terminates or request certain services
from the operating system?
(@) Maskable interrupt
(©) Spurious interrupt
(©) Hardware interrupt
(@) Software interrupt
12, Software interrupt may also be unexpectedly
triggered by program execution errors. These
interrupt are typically called
(@) traps () exceptions
(©) Both (a) and (b) (@) None of these
13. The communication between I/O devices and the
processor of the computer system is implemented
using
(a) interface unit (b) interrupt
(©) instruction set (d) deadlock
14, Which of the following devices is having a highest
priority while assigning interrupt?
(@) Hard Disk (b) Printer (c) Key board (d) Floppy
15. In implementing interrupt, action that is done by
the hardware include
(a) souring all the register on stack
(b) souring the interrupt vector into special register
() fetching the address of the interrupt handler
(@) Both (b) and (e)Computer Concepts Computer Architecture
B Previous Years’ Questions (PYOs)
46. Ifa processor clock is rated as 2500 million cycles
pet second, then its clock period is 022,
(a) 20x 10° sec (b) 4.00% 10°" sec
(0) 1.00 10°" see (a) None of these
47. The process when processor fetch or decode
another instruction during the execution of current
instruction is called (oan)
{a) Supercomputing, () Pipelining
(Cloud computing (4) Grid computing
48. Which of the following is used by ALU to store
the intermediate results? rom
(a) Stack (b) Heap
(©) Registers (@) Accumulators
19. Consider a computer system with speed of 10°
instructions per second. A program P, having 2n?
steps is run on this system, where n is the input
size. If n =10000, what is the execution time for P?
(2021)
@12s &)2s (100s (A) 200
20, The time required for fetching and execution of
one simple machine instruction is known as [2020]
(a) Delay time (b) CPU cycle
(©) Real Time (d) Seek Time
3}
21, Let the memory access time is 10 milliseconds and
cache access time is 10 microseconds. Assume the
cache hit ratio 15%, The effective memory access
time is (2018, 17)
(a) 2 milliseconds
(b) 15 milliseconds
(©) 1.85 microseconds
(d) 1.85 milliseconds
22, Consider a hard disk with 16 recording surfaces
(0-15) having 16384 cylinders (0 -16383) and each
cylinder contains 64 sectors (0 -63). Data storage
capacity in each sector is 512 bytes. Data are
organised cylinder-wise and the addressing format
is < cylinder no., surface no,, sector no.>. A file of
size 42797 KB is stored in the disk and the starting
disk location of the file is <1200, 9, 40>. What is
the cylinder number of the last sector of the file, if
sX% Count Your Score
Chapter Challenges
L @ 20) | 3 ob) | 4 0) | 5%. ©
I (@) 12. (c) | 13. (a) 4 (0) 15. (d)
Previous Years’ Questions (PYQs)
1 ) | i ® | 8 @ | 1% @ | 0 OH
it is stored in a continuous manner? 01g)
(a) 1284 (b) 1282
(©) 1286 (@) 1288,
23. A hard disk has a rotational speed of 6000 rpm. Its
average latency time is (pov)
(a) 5x 107 sec (b) 0.05 sec
(©) 1 sec (a) 05 see
| e@ | 20 | sa@ iam lwo
Jau@ leo | |