StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Architecture - Essay Example

Cite this document
Summary
The paper "Computer Architecture" state processes of pipelining maintain all portions of the processor occupied and increase the amount of practical work the processor could do in a given time. While pipelining lessens the processor's cycle that time and increases in the execution of instructions…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Computer Architecture
Read Text Preview

Extract of sample "Computer Architecture"

12 December Computer Architecture An operating system refers to the concept of hardware activities that allow the hardware to be controlled by the computers programmers. It also involve s the management of resources shared among the computer users. There are related explanations about different issues that influence the process of designing the current operating systems, such as a laboratory component that allows all the learners to experiment using different operating systems. Operating systems and most of their concepts become more complex as technology improves as well as its application of software is involved. It is important to ensure that all the learners comprehend the extent of the using an operating system before studying in details about the internal implementation algorithms and data configurations. This means that there is a relationship between both the use of operating systems (externals) and the designing and implementation (internals) of an operating system (Ramachandran and Leahy 136). Learning about the internal design has significance in different areas such as algorithm design and implementation, dependable programming, modern device development, caching material across the web, building virtual environments, network management, building secure and safe systems and others The main purpose of this application is to convey a comprehensive understanding of the algorithms and equivalent skill that is used within operating systems, it also involves the merging of the knowledge acquired in the course that would help the learners value the trade-os involved in the process that allow the designing and implementing an operating system. The OSes are the main software systems that show various s/w engineering issues. Most of the OSes cause problems mainly in concurrency. For this reason, a number of people tend to end up writing OSes and provide modifications to the existing systems for example, Linux. Linux is embedded software for the normal hardware in the operating systems. Various subsystems that complete the functions & structures in the CPU Scheduling as well l as scheduling for the multiprocessors. CPU has different components such as registers (Ramachandran and Leahy 106). These are the transitory storage sites that could store the references to memory locations where the next instruction was carried out. It also allows the CPU to keep its eminence information. It also has the Arithmetic Logic Unit (ALU). Its purpose is to carry out the real implementation of complex arithmetical functions and logical operations on data. The ALU execute the four functions: add, increment, nand, and subtract. The CPU should also have the control unit that controls and coordinate the system’s different applications, codes and the Operating System’s instructions that are being implemented. It also allows the fetching of the code, and in the interpretation of the codes, that supervises the completion of the different instructions set. The control unit establishes the application instruction that is being processed and what to prioritize. It controls when instructions are implemented, and this implementation allows the applications to process data (Ramachandran and Leahy 225). The Instructions that are set are enhanced with interrupt support. The LC-2200-32 is the 32-bit computer that has 16 broad registers and a program counter (PC) register separately. All addresses are normally word addresses. The Register 0 is usually wired to zero. Likewise, it always translates to be zero and written as ignored. The LC-2200-32 processor enhanced with interrupt support instructions, and the FSM for its implementation. These guidebooks presume that one has familiarity with the LC-2200 data path. Software is currently all around and the need for individuals to design, develop, test, and retain excellent applications that extend to develop annually. Additionally, Software Design and Development involves the learning of methodologies, concepts, processes, and technologies that contribute to the engineering and production of software systems. Software improvement is one of the fastest growing areas in the Information Technology sector. It provides considerable job opportunities in areas like computing, financial, telecoms and games areas. By stating the art technology as used in computing programmes it improves learning experiences that learners in the real world experience improved practical skills. In the mainframe Computer, the LC (4/15) is designed to require maximum performance. For this reason, the Computer shows full configuration information. The structure of the computer and the factor design of the LC (4/15) does not withhold on providing quality performance, as it is the best merge of power and efficiency. The LC (4/15) offers a fixed notion because it is easy to use best with its slim design. This feature is usually located on one the side of the unit and the modular bay with the newly designed latch that makes it easier for introduction and deduction of the diverse module options. The L1 and L2 caches are the two features involved in data supply and used for transferring information to and from the processor in the SPARCstation Classic LC (4/15) .The LC (4/15) Computer only supports 50MHz PowerPC 604. In the SPARCstation Classic LC (4/15), L1 cache has a size of 64 kilobytes as the L2 cache is rated at either one or two megabytes (Ramachandran and Leahy 117). When one has a clear idea of which Computer best suits his/her needs, he/she should also check if the Computer has full support and warranties by its manufacturer. For instance, the SPARCstation Classic LC (4/15) is supported by the solar energy and has many selections and options from the Computer as well as choosing from different manufacturers. Just the same as the Computer processor, graphics capacity, Computer presentation options and Computer RAM and many other features that the Computer provides. Deciding on what is required in the Computer features may be a difficult task to do but it is necessary to select the Computer one needs that deserves its purpose. The LC (4/15) Computer specification is often taken into consideration before purchasing a particular type of Computer. There are standard specifications for most home users and small business customer. Additionally the Operating System should securely complex resources, as there is need to ensure that an application does not affect the operating system as well as not denying other services such as abuse of resources. The target of achieving the efficiency and flexibility, requires hard are support for the dual-mo de operation. The addition of the memory protection hardware applications influences the efficiency of the operating system (Ramachandran and Leahy 76). A Processor that compute in the existence of the risk that may experience delay in processing of the succeeding instructions and the consequent instructions as the values entail as inputs are ready. Most of the processors in a computer not only compute the occurrence of a hazard but can also compensate by having extra data paths that need to provide inputs to the computation step prior to a subsequent instructions that would in any case compute them. On the other hand, processors determine the instructions that the sequential ones are dependent on the current ones and can be executed without hazards. Most of the processors of this kind may complete an execution. In the standard instruction provided in the sequence, that involves a risk. The processors provide a different effect in a single cycle time the similar stages of the pipeline that will start obtaining instructions sequentially. This kind of instructions cannot be permitted to take effect on the programmer that has a distracted the power to the other part of such program. The processors may not branch to the calculation that never occurred. Different processors would try to branch the prediction that would be able to start executing two different programs while assuming the branch that is not taken regarding the work that pertains to the incorrect guess (Ramachandran and Leahy 98). The implementation of the processor has a branch prediction that always makes correct predictions can reduce the performance of the branching process. If the branches are predicted it would create extra work for the same processor. In such a case, flushing from the pipeline the incorrect code path that has started execution before resuming to the correct location. Programs are written for the pipelined processor that deliberately stops branching to reduce the possible loss of speed. For example, the programmer should handle the case always with sequential execution in the branch that only manages to detect the unusual cases. While using programs such as analyzing the code that allow the programmer to measure how a particular branch should actually execute and increase the impending optimizing the code. Most of the special situations are used to self-modify the programs and technique used to self-modify the code that can be problematic on the pipelined processor. The technique used in the effects of the program has to be modified using its own instructions. The processor used in the instruction cache that the inventive instructions are already copied into the input of the modification that will take effect (Ramachandran and Leahy 143). An independent pipeline, such as mathematical pipeline in the arithmetic processors in the Intel Pentium products and video processors similarly perform many computations in a different execution of the processor instructions. These conditions do not inherently pose hazards to the execution of instructions. The processes of pipelining maintain all portions of the processor occupied and increase the amount of practical work that the processor could do in a given time. While pipelining typically lessen the processor's cycle that time and increases in the execution of instructions. The advantageous speed that diminishes to the extent at which the execution runs into hazards that need better execution of the ideal rate. The processor executes the only a single instruction at that particular time. The beginning of the next instruction when it is delayed when the hazards are unreservedly executed. Work Cited Ramachandran, Umakishore, and William Leahy. Computer systems: an integrated approach to architecture and operating systems. Boston, MA: Pearson, 2011. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Architecture Research Paper Example | Topics and Well Written Essays - 2000 words”, n.d.)
Computer Architecture Research Paper Example | Topics and Well Written Essays - 2000 words. Retrieved from https://studentshare.org/information-technology/1495880-computer-architecture
(Computer Architecture Research Paper Example | Topics and Well Written Essays - 2000 Words)
Computer Architecture Research Paper Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/information-technology/1495880-computer-architecture.
“Computer Architecture Research Paper Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/information-technology/1495880-computer-architecture.
  • Cited: 1 times

CHECK THESE SAMPLES OF Computer Architecture

Network Infrastructure Planning

Active Directory employs the use of LDAP-Lightweight Directory Access Protocol (Computer Architecture Association, 2011).... Network Infrastructure Planning Name Institution Date Network Infrastructure Planning Permissions are the core component of server security architecture that can be applied to manage the process of authenticating groups, users and computers to have access to files in a network (Bruce & Smith, 2011).... For example, a user logs into a computer in the satellite branches that is part of the Windows domain, the Active Directory examines the passwords and usernames submitted to discern whether the user is a normal user or system administrator....
3 Pages (750 words) Research Paper

IT Infrastructure

International Symposium on High-Performance Computer Architecture, 3-4.... Journal of International Symposium on High-Performance Computer Architecture, 3-4.... As Barton and Muttik indicate, using cloud storage from primary source storages is not similar to using the cloud storage for protection of data....
1 Pages (250 words) Research Paper

Advanced Computer Architecture

This paper "Advanced Computer Architecture" focuses on the fact that microprocessors are also recognised as modernised 'Central Processing Units' (CPUs).... These are generally a chip comprises various programs that include control circuits, 'Arithmetic Logical Unit' (ALU), and register circuits....
8 Pages (2000 words) Case Study

Advanced Computer Architecture Classification in Regards to Microprocessing

The goal of the paper "Advanced Computer Architecture Classification in Regards to Microprocessing" is to shed light on the organization and architecture of multiprocessor computing systems.... The multiprocessors involve Computer Architecture most common multiprocessor systems today use SMP architecture.... In this scenario of multicore processors, the SMP architecture applies to the nuclei, handling them as separate processors.... Multiprocessing in terms of architecture has some benefits like increased processing power, scale resource use of application requirements and also some additional operating system responsibilities such as all processors remain busy, they work on consistent copies of shared data, execution of related processes synchronized and mutual exclusion is enforced....
10 Pages (2500 words) Term Paper

Foundations of IT- Designing a Computer Architecture

Both are set up on the processor die. I would like my ideal computer to Designing a Computer Architecture Current processors make use of a fast accessed cache memory that keeps data that are used somuch.... t the moment, computers are based on the von Neumann architecture.... Nonetheless, the von Neumann architecture has its limitations.... With the increase of CPU speed, it was evident that a solution is needed to defeat the bottleneck ("Von Neumann architecture," n....
2 Pages (500 words) Essay

Computer Architecture and Computer Games

The author of the paper examines the history of computer games development.... It used the early DEC PDP1 computer and was at first only issued with new computers.... For the next ten years, computer gaming was reserved for academic enthusiasts, and there was very little awareness of the potential of this medium outside the big universities For the next ten years, computer gaming was reserved for academic enthusiasts, and there was very little awareness of the potential of this medium outside the big universities....
6 Pages (1500 words) Assignment

The Invention of Microcontrollers

The basic Computer Architecture comprises control logic, registers, instruction register, instruction memory, Arithmetic Logic Unit, Input/output and accumulator as illustrated in figure 1 below.... From the paper "The Invention of Microcontrollers" it is clear that unlike computers, microcontrollers have all components integrated on one chip resulting in advantages such as size reduction, lower cost, easier design and simulation, low energy consumption, and ease of use....
9 Pages (2250 words) Lab Report

3D Silicon Chips in Computer Architecture

The paper "3D Silicon Chips in Computer Architecture" states that enabling software developers and programmers to quickly find bugs, recognize operational blockages and protect their code against attacks should be the primary goal of system designers at every level.... t is not easy to develop software of high quality for modern computer systems....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us