Architecture Risc Computational kernels
The main drawback of processors, performed under the CISC architecture, a large number of possible ways to send data, which leads to complicated operations, the use of different methods of addressing. All mikrooperatsii of CISC processors have a different format, different number of operands, as well as various times for various instructions.
Analysis of a set of instructions processors made by CISC architecture, showed that the most used programs (80%) instructions the processor accounted for only 20% of all teams CISC processors, while 80% lesser teams.
To solve the problems inherent in CISC architecture, has developed a new RISC architecture. The core computer, performed on RISC architecture, and contains a collection of the most frequently used mikrooperatsy, so at a crystal computer was made possible the deployment of more general purpose registers.
The main advantages of RISC architecture is the presence of the following characteristics:
A large number of general-purpose registers.
Universal format for all instructions.
Equal time, carry out all instructions.
Virtually all the transactions carried out by sending data along the route register - register.
These features allow teams to handle the flow of instructions on the conveyor principle, that is synchronized hardware parts, taking into account the serial control from one hardware unit to another.
Hardware blocks allocated in the RISC architecture:
Block downloading instructions includes the following components: cluster sample instructions from memory instructions, the register of instructions, where instruction is placed after the sample and block decoding instructions. This stage is called stage sampling instructions.
General-purpose registers, together with the control unit registers constitute the second stage of the conveyor responsible for reading instruction operands. Operands can be stored in the instructions or in a general-purpose registers. This stage is called the sample stage operand.
Arithmetic logic unit, along with the logic of management, which is based on the contents of the register of instructions, determines the type carried out mikrooperatsii. The data in addition to register instructions may be counter command, in carrying out mikrooperatsy conditional or unconditional move. This step is called the executive level of the conveyor.
A set of general-purpose registers, logic and sometimes record of RAM form a step storing data. At this stage the result of instructions written in general-purpose registers or in main memory.
Статьи по теме:
The scheme of the free acceleration of InternetFree software for everyone!Robot Tartalo knocking at your doorMETHODS OF PROTECTION FROM COMPUTER VIRUSESThe advent of IBM PC Data protection. Luxury or means of survival?The attack at Infinity Gb V2 2 Backing up the blog on Blogspot. Blogger Backup utilityMaintenance of computers in the Framework for IT outsourcingThe program to automate Beauty Shop - Business tool or waste of money?UAB «Business Technology» Conducted Integrated Automation Ltd. Insurance Company «Amkopolis»Network The choice of antivirus software for home computerBlack Banner - Myth or Reality? LIBCOM-2007: new items of high technology from the company «Alee Software»Implementation Crm Systems Quick Sales 2 The Company «Epos»Spyware battle; Use of firewall protectionCare home PC Zao «Light Kommunikeyshn» confirm its status «Microsot Gold Certified Partner» In 2008Classification of computers Checking Software LicensingGraycatsoft - Server SoftwareCorporate Information System (Crm, Erp, mobile commerce)Determination of computers as an object of design The reverse side of the coin Spyware COMPUTER CRIME PREVENTIONDevelopment and dissemination of computer virusesMicrosoft Great Plains to customers in Russia: how to find a consultant and the most frequent questionsProtect photos, images and video Windows Vista: When ends DiskspaceInstalling Windows Xp on a network without the use of RisMs Word Vs NotepadFree Internet Or How to Become a HackerThe company Janet Systems Llc Presented Soa-Platform Ijanet Framework Ultra The exhibition «Kitel 2008»The funds protect your computer and maximum securityMacromedia Dreamweaver against Microsoft placed on the first lane Plotters DIRECT IMAGE VISA-2000. Virtual seller of computer equipmentIntegration Ibm Rational Clearquest and Microsoft Project - The key to successful planningHow to make the right choice? 1C: Enterprise 7.7. or 8.0ISA bus The process of software development, the Program for Business«Rolling» to previous versions of Microsoft WindowsWhy work for a computer is harmful to human healthThe possibility of CompactPCI have more than 8 slotsTheft of computer dataThe most demanded software!On Legalization. Price Errors!Installing Systems Videonablyudeniya In OfficePen plotters (PP, PEN PLOTTER)"Trojan horse"What is the standard CompactPCI?The new search softwareIntroduction to WindowsWindows Media Player