Соглашение | Публикация статей

Красивые рольшторы - roll-service.by

Architecture Risc Computational kernels
Категория: English version

The main drawback of processors, performed under the CISC architecture, a large number of possible ways to send data, which leads to complicated operations, the use of different methods of addressing. All mikrooperatsii of CISC processors have a different format, different number of operands, as well as various times for various instructions.

Analysis of a set of instructions processors made by CISC architecture, showed that the most used programs (80%) instructions the processor accounted for only 20% of all teams CISC processors, while 80% lesser teams.
To solve the problems inherent in CISC architecture, has developed a new RISC architecture. The core computer, performed on RISC architecture, and contains a collection of the most frequently used mikrooperatsy, so at a crystal computer was made possible the deployment of more general purpose registers.

The main advantages of RISC architecture is the presence of the following characteristics:

A large number of general-purpose registers.

Universal format for all instructions.

Equal time, carry out all instructions.

Virtually all the transactions carried out by sending data along the route register - register.

These features allow teams to handle the flow of instructions on the conveyor principle, that is synchronized hardware parts, taking into account the serial control from one hardware unit to another.
Hardware blocks allocated in the RISC architecture:

Block downloading instructions includes the following components: cluster sample instructions from memory instructions, the register of instructions, where instruction is placed after the sample and block decoding instructions. This stage is called stage sampling instructions.

General-purpose registers, together with the control unit registers constitute the second stage of the conveyor responsible for reading instruction operands. Operands can be stored in the instructions or in a general-purpose registers. This stage is called the sample stage operand.

Arithmetic logic unit, along with the logic of management, which is based on the contents of the register of instructions, determines the type carried out mikrooperatsii. The data in addition to register instructions may be counter command, in carrying out mikrooperatsy conditional or unconditional move. This step is called the executive level of the conveyor.

A set of general-purpose registers, logic and sometimes record of RAM form a step storing data. At this stage the result of instructions written in general-purpose registers or in main memory.


Статьи по теме:

The scheme of the free acceleration of Internet
Free software for everyone!
Robot Tartalo knocking at your door
METHODS OF PROTECTION FROM COMPUTER VIRUSES
The advent of IBM PC
Data protection. Luxury or means of survival?
The attack at Infinity Gb V2 2
Backing up the blog on Blogspot. Blogger Backup utility
Maintenance of computers in the Framework for IT outsourcing
The program to automate Beauty Shop - Business tool or waste of money?
UAB «Business Technology» Conducted Integrated Automation Ltd. Insurance Company «Amkopolis»
Network
The choice of antivirus software for home computer
Black Banner - Myth or Reality?
LIBCOM-2007: new items of high technology from the company «Alee Software»
Implementation Crm Systems Quick Sales 2 The Company «Epos»
Spyware battle; Use of firewall protection
Care home PC
Zao «Light Kommunikeyshn» confirm its status «Microsot Gold Certified Partner» In 2008
Classification of computers
Checking Software Licensing
Graycatsoft - Server Software
Corporate Information System (Crm, Erp, mobile commerce)
Determination of computers as an object of design
The reverse side of the coin Spyware
COMPUTER CRIME PREVENTION
Development and dissemination of computer viruses
Microsoft Great Plains to customers in Russia: how to find a consultant and the most frequent questions
Protect photos, images and video
Windows Vista: When ends Diskspace
Installing Windows Xp on a network without the use of Ris
Ms Word Vs Notepad
Free Internet Or How to Become a Hacker
The company Janet Systems Llc Presented Soa-Platform Ijanet Framework Ultra The exhibition «Kitel 2008»
The funds protect your computer and maximum security
Macromedia Dreamweaver against Microsoft placed on the first lane
Plotters DIRECT IMAGE
VISA-2000. Virtual seller of computer equipment
Integration Ibm Rational Clearquest and Microsoft Project - The key to successful planning
How to make the right choice? 1C: Enterprise 7.7. or 8.0
ISA bus
The process of software development, the Program for Business
«Rolling» to previous versions of Microsoft Windows
Why work for a computer is harmful to human health
The possibility of CompactPCI have more than 8 slots
Theft of computer data
The most demanded software!
On Legalization. Price Errors!
Installing Systems Videonablyudeniya In Office
Pen plotters (PP, PEN PLOTTER)
"Trojan horse"
What is the standard CompactPCI?
The new search software
Introduction to Windows
Windows Media Player