Comp organisation and architecture Flashcards
Role of processor
A device that follows out computation on data by following out instructions
Role of main memory
Stores data and instructions that will be used by the processor. It is connected to the processor by several different buses
Types of main memory
RAM - Temporary storage space with quick access times
- Volatile (all contents lost when turned off)
ROM - permanent store of data and instructions that can be accessed by the computer
-Not volatile
Uses of RAM
Allows programs and software to run
Stores data and instructions needed by processor for FE cycle
Part of OS is loaded in RAM
Uses of ROM
Boot program
Buses
A set of parallel wires that transmit signals between components, connecting the processor to several I/O controllers
Role of address bus
- Uni directional from PROCESSOR–> MEMORY
- Used to access anything stored in main memory so the data bus can access
Role of data bus
Carries data and instructions MemoryProcessor
Bi directional
Role of control bus
Carries control signals (timing or memory read/write)
Bi directional
Role of I/O controllers
- Translates between processor and peripherals
- Buffers data from CPU to device so processor doesn’t have to wait for each device to respond (I/O respond slower to processor)
- Sends specific control signals to the I/O devices from processor
- I/O connected to controllers by ports so can exchange data
Von Neumann
Technique used for building a processor where…
Data and instructions are stored in the same memory and accessed via buses
Where is von neumann used?
General purpose computers
Harvard architecture
Uses separate buses and memory for data and instructions
Where is Harvard used?
Embedded devices (mobiles, burglar alarms, DSP)
Digital signal processing - real world continuous data compressed to enable faster processing
Microprocessors
Micro controllers
Advantages of Harvard over VN
-Data and instructions can be accessed simultaneously and are handled quicker as don’t have to share same bus
-Reduce delays waiting for memory fetches
-Instructions and data can have different word length
-Avoids possibility of data being executed as code, which is one
method that can be exploited by hackers