Computer Architecture Articles

Page 15 of 26

What are the methods of cache-coherency in computer architecture?

Ginni
Ginni
Updated on 24-Jul-2021 869 Views

There are two methods of cache-coherency which are as follows −Cache–Memory CoherenceIn a single cache system, coherence between memory and the cache is maintained using one of two policies − (1) write-through, and (2) write-back. When a task running on a processor P requests the data in memory location X, for example, the contents of X are copied to the cache, where it is passed on to P.When P updates the value of X in the cache, the other copy in memory also needs to be updated to maintain consistency. In write-through, the memory is updated every time the cache ...

Read More

What is shared-memory model in computer architecture?

Ginni
Ginni
Updated on 24-Jul-2021 7K+ Views

A shared memory model is one in which processors connects by reading and writing locations in a shared memory that is similarly applicable by all processors. Each processor can have registers, buffers, caches, and local memory banks as more memory resources. Some basic issues in the design of shared-memory systems have to be taken into consideration. These involves access control, synchronization, protection, and security.Access control specifies which process accesses are achievable to which resources. Access control models create the needed check for each access request issued by the processors to the shared memory, against the contents of the access control ...

Read More

What is Character Oriented Protocol in computer architecture?

Ginni
Ginni
Updated on 24-Jul-2021 4K+ Views

The character-oriented protocol is depends the binary code of a character set. The code generally used is ASCII (American Standard Code for Information Interchange). It is a 7-bit code with an eighth bit used for parity. The code has 128 characters, of which 95 are graphic characters and 33 are control characters. The graphic characters involves the upper- and lowercase letters, the ten numerals, and multiple unique symbols.The control characters are used to route information, organizing the test in the desired structure, and for the design of the printed page. The characters that control the transmission are known as communication ...

Read More

What is Intel 8089 IOP?

Ginni
Ginni
Updated on 24-Jul-2021 4K+ Views

The Intel 8089 l/0 processor is contained in a 40-pin integrated circuit package. Within the 8089 are two independent units called channels. Each channel combines the general characteristics of a processor unit with those of a direct memory access controller.The 8089 is designed to function as an IOP in a microcomputer system where the Intel 8086 microprocessor is used as the CPU. The 8086 CPU initiates an l/0 operation by building a message in memory that describes the function to be performed. The 8089 IOP reads the message from memory, carries out the operation, and notifies the CPU when it ...

Read More

What is IBM 370 I/0 Channel?

Ginni
Ginni
Updated on 24-Jul-2021 1K+ Views

The I/O processor in the IBM 370 computer is known as a channel. A general computer system configuration contains multiple channels with each channel connected to one or more I/O devices.There are three types of channels including a multiplexer, selector, and block-multiplexer. The multiplexer channel can be linked to multiple slow and medium-speed devices and is adequate for operating with several I/O devices together.The selector channel is created to manage one I/O operation at a time and is generally used to control one high-speed device. The block-multiplexer channel merges the features of both the multiplexer and selector channels. It supports ...

Read More

What is Daisy Chaining Priority in computer architecture?

Ginni
Ginni
Updated on 24-Jul-2021 15K+ Views

The daisy-chaining method of creating priority includes a serial connection of all devices that request an interrupt. The device with the highest priority is located in the first position, followed by lower-priority devices up to the device with the lowest priority, which is situated last in the chain. This technique of connection between three devices and the CPU.The interrupt request line is average to all devices and design a wired logic connection. If some device has its interrupt signal in the low-level state, the interrupt line goes to the low-level state and enables the interrupt input in the CPU. When ...

Read More

What is Strobe Control?

Ginni
Ginni
Updated on 24-Jul-2021 13K+ Views

The strobe control technique of asynchronous data transfer operates a single control line to time each transfer. The strobe can be activated by either the source or the destination unit. The diagram shows a source-initiated transfer.The data bus gives the binary data from the source unit to the destination unit. Generally, the bus has multiple lines to transfer a unified byte or word. The strobe is a single line that instructs the destination unit when an accurate data word is accessible in the bus.As displayed in the timing diagram of figure (b), the source unit first places the data on ...

Read More

What is Asynchronous Data Transfer in Computer Architecture?

Ginni
Ginni
Updated on 24-Jul-2021 5K+ Views

In this transmission, signals are sent between the computers and external systems or vice versa asynchronously. This generally defines data that is sent at infrequent intervals instead of in a steady stream, which represents that the first element of the execute file might not ever be the first to be transmitted and enter at the destination.There are different elements of the execute data that are sent in multiple intervals, frequently together, but follow several paths approaching the destination. The transfer of asynchronous data doesn’t need the coordination or timing of bits between the two endpoints.The internal operations in a digital ...

Read More

What is the difference between Isolated and memory-mapped I/O?

Ginni
Ginni
Updated on 24-Jul-2021 5K+ Views

Isolated I/OIn the isolated I/O configurations, the CPU has definite input and output instructions, and each of these instructions is related to the address of an interface register. When the CPU fetches and decodes the operation code of an input or output instruction, it locates the address related to the instruction into the common address lines.Simultaneously, it enables the I/O read (for input) or I/O write (for output) control line. This instructs the external elements that are connected to the common bus that the address in the address lines is for an interface register and not for a memory word.In ...

Read More

What are the uses of multibyte data organization in computer architecture?

Ginni
Ginni
Updated on 24-Jul-2021 728 Views

There are two commonly used for organizations for multibyte data such as big-endian and little-endian. In the big-endian format, the most important byte of a value is saved in location X, the following byte in location X + 1, and so on. For example, the hexadecimal value 0102 0304H (H for hexadecimal) would be stored, starting in location 100H, as shown in table (a).Data organization in (a) big endian and (b) little endian formatsMemory AddressData (in hex)10101102021030310404(a)Memory AddressData (in hex)10104102031030210401(b)In little endian, the order is reversed. The smallest significant byte is saved in location X, the next byte in location ...

Read More
Showing 141–150 of 253 articles
« Prev 1 13 14 15 16 17 26 Next »
Advertisements