Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Computer Architecture Articles
Page 9 of 26
What is the difference between RISC and CISC in Computer Architecture?
RISCRISC represents Reduced Instruction Set Computer. In Reduced Instruction Set Computer (RISC) architecture, the instruction set of the computer is simplified to reduce the execution time. RISC has a small set of instructions, which generally include register-to-register operations. In RISC, all instructions have simple register addressing and hence use less number of addressing modes.CISCCISC represents Complex Instruction Set Computer. It comprises a complex instruction set. It incorporates a variable-length instruction format. Instructions that require register operands may take only two bytes.If the computer has 32-bit words (four bytes), the first instruction occupies half a word, while the second instruction needs ...
Read MoreWhat is RISC Processor?
RISC stands for Reduced Instruction Set Computer. In Reduced Instruction Set Computer (RISC) architecture, the instruction set of the computer is simplified to reduce the execution time. RISC has a small set of instructions, which generally include register-to-register operations.Thus, data is stored in processor registers for computations, and results of the computations are transferred to the memory using store instructions. All operations are performed within the registers of the CPU. In RISC, all instructions have simple register addressing and hence use less number of addressing modes.RISC uses relatively a simple instruction format and is easy to decode. Here, the instruction ...
Read MoreWhat is CISC Processor?
CISC stands for Complex Instruction Set Computer. It comprises a complex instruction set. It incorporates a variable-length instruction format. Instructions that require register operands can take only two bytes.The instructions that require two memory addresses can take five bytes to include the complete instruction code. Thus, CISC has a variable-length encoding of instructions and the execution of instructions may take a varying number of clock cycles. The CISC processor provides direct manipulation of operands that are in memory.The task of a compiler is to generate a sequence of machine instructions for each high-level language statement. The task is simplified if ...
Read MoreExplain the characteristics of CMOS?
There are various characteristics of CMOS which are as follows −Noise Margin − The noise margin of CMOS logic ICs is significantly greater than that of TTL ICs. These circuits are available with a broad supply voltage range and the noise margin improves with the supply of voltage VCC.The noise margin of CMOS is roughly 0.45 VDD. If the operating voltage is 12 V, the noise margin will be 5.4V. This implies that the connecting link between the driver and the load will not be affected by the noise interference unless the peak value of the noise picked up exceeds ...
Read MoreWhat is a Priority Encoder?
The priority encoder is a circuit that executes the priority function. The logic of the priority encoder is such that two or more inputs appear at an equal time, the input having the largest priority will take precedence. The truth table of a four-input priority encoder is given in the table. The X’s in the table designate don’t care conditions. Input I0 has the largest priority, so indifferent of the values of other inputs when this is input is 1, the output creates an output xy=00.I1 has the next priority level. The output is 01 if I1=1 supported that I0=0, ...
Read MoreWhat is Wormhole Routing?
Wormhole routing is a unique case of virtual cut-through, where the buffers at the intermediate nodes are the size of a flit. The network latency is equal to in virtual cut-through and thus autonomous of the communication distance.The advantage of wormhole routing over circuit switching and virtual cut-through appears in networks where contention is not negligible. In circuit switching, once a channel is assigned to a message, it cannot be used by other messages until the channels become free. In virtual cut-through, blocked messages should be saved in the buffer of intermediate nodes.In wormhole routing, channels can be transferred by ...
Read MoreHow to solve this problem of scalable computers in computer architecture?
There are two basic problems to be solved in any scalable computer systems such as −Tolerate and hide the latency of remote loads.Tolerate and hide idling because of synchronization between parallel processors.Remote loads are unavoidable in scalable parallel systems that use some form of distributed memory. Accessing a local memory usually requires only one clock cycle while access to a remote memory cell can take two orders of magnitude longer time. If a processor issuing a remote load operation had to wait for the operation to be completed without doing any usual work in the meantime, the remote load would ...
Read MoreWhat is USB?
USB represents Universal Serial Bus. It is an industry-standard developed in the mid-1990s that represents the cables, connectors, and communication protocols used in a bus for connection, communication, and power supply among computer and electronic devices.USB operates at 12 Mbps with particular consideration for low-cost peripherals. It provides up to 127 devices with both synchronous and asynchronous data transfers. A USB cable has a rectangular “TYPE A” plug at the computer end and a square “TYPE B” plug at the peripheral end.A Universal Serial Bus (USB) is a common interface that allows the connection between devices and host controllers including ...
Read MoreWhat is RS 232C Standard?
RS-232 is a standard communication protocol for connecting computers and their peripheral devices to enable serial data exchange. In simple terms, RS232 represents the voltage for the path used for data exchange between the devices. It determines the common voltage and signal level, common pin wire configuration and minimum, amount of control signals.RS232 represents the signals connecting between DTE and DCE. Therefore, DTE represents Data Terminal Equipment and an example for DTE is a computer. DCE represents Data Communication Equipment or Data Circuit Terminating Equipment and an example for DCE is a modem.RS232 was introduced in the 1960s and was ...
Read MoreWhat is UART?
UART represents Universal Asynchronous Receiver Transmitter. It is dedicated to hardware related to serial communication. UART is one of the most generally used serial communication techniques. UART is being used in several applications like GPS Receivers, Bluetooth Modules, GSM and GPRS Modems, Wireless Communication Systems, RFID-based applications, etc.Functions of the UARTThere are various functions of UART which are as follows −It can change parallel data into serial data for outbound communicationsIt can change serial data into parallel data for inbound communicationsIt can add a parity checking bit on outbound transmissions and tests the parity bit for inbound transmissionsIt can handle ...
Read More