Found 312 Articles for Computer Architecture

What is J-K Flip Flop?

Ginni
Updated on 24-Jul-2021 08:18:27

8K+ Views

J-K flip-flop can be treated as an alteration of the S-R flip-flop. J represents SET, and 'K' represents CLEAR. In the JK flip-flop, the ‘S’ input is known as the ‘J’ input, and the ‘R’ input is known as the ‘K’ input. The output of the JK flip-flop does not modify if both ‘J’ and ‘K’ are ‘0’. If both the inputs are ‘1’, then the output dial to its free.The figure shows the circuit diagram of a JK flip-flop.The truth table of the JK flip-flop is displayed in the table.SRQN-100QN01010111$\overline{Q_{N}}$The logic symbol for the JK flip-flop is demonstrated in ... Read More

Explain the performance of Addition and Subtraction with signed magnitude data in computer architecture?

Ginni
Updated on 24-Jul-2021 07:21:32

25K+ Views

A signed-magnitude method is used by computers to implement floating-point operations. Signed-2’s complement method is used by most computers for arithmetic operations executed on integers. In this approach, the leftmost bit in the number is used for signifying the sign; 0 indicates a positive integer, and 1 indicates a negative integer. The remaining bits in the number supported the magnitude of the number.Example: -2410 is defined as −10011000In this example, the leftmost bit 1 defines negative, and the magnitude is 24.The magnitude for both positive and negative values is the same, but they change only with their signs.The range of ... Read More

What are the functions of Scheduling Model in computer architecture?

Ginni
Updated on 24-Jul-2021 07:19:57

330 Views

A scheduling system consists of program tasks, a target machine, and a schedule in which a specific performance criterion is optimized.Program Tasks − The characteristics of a parallel program can be defined as the system (T,

What is scheduling problem in computer architecture?

Ginni
Updated on 24-Jul-2021 07:17:45

1K+ Views

The general scheduling problem has been described in different ways in different fields. The classical problem of job sequencing in production management has influenced most of the solutions to this problem, which generally assumes a set of resources that could provide service to a set of consumers. The main objective is to find an efficient policy for managing the access to the resources by the consumers to optimize some desired performance measures.In distributed systems, the scheduling problem arises because the concurrent parts of a program or set of programs must be arranged in time and space so that the overall ... Read More

What are the methods of cache-coherency in computer architecture?

Ginni
Updated on 24-Jul-2021 07:16:21

494 Views

There are two methods of cache-coherency which are as follows −Cache–Memory CoherenceIn a single cache system, coherence between memory and the cache is maintained using one of two policies − (1) write-through, and (2) write-back. When a task running on a processor P requests the data in memory location X, for example, the contents of X are copied to the cache, where it is passed on to P.When P updates the value of X in the cache, the other copy in memory also needs to be updated to maintain consistency. In write-through, the memory is updated every time the cache ... Read More

What is shared-memory model in computer architecture?

Ginni
Updated on 24-Jul-2021 07:13:43

5K+ Views

A shared memory model is one in which processors connects by reading and writing locations in a shared memory that is similarly applicable by all processors. Each processor can have registers, buffers, caches, and local memory banks as more memory resources. Some basic issues in the design of shared-memory systems have to be taken into consideration. These involves access control, synchronization, protection, and security.Access control specifies which process accesses are achievable to which resources. Access control models create the needed check for each access request issued by the processors to the shared memory, against the contents of the access control ... Read More

What is Character Oriented Protocol in computer architecture?

Ginni
Updated on 24-Jul-2021 07:12:44

2K+ Views

The character-oriented protocol is depends the binary code of a character set. The code generally used is ASCII (American Standard Code for Information Interchange). It is a 7-bit code with an eighth bit used for parity. The code has 128 characters, of which 95 are graphic characters and 33 are control characters. The graphic characters involves the upper- and lowercase letters, the ten numerals, and multiple unique symbols.The control characters are used to route information, organizing the test in the desired structure, and for the design of the printed page. The characters that control the transmission are known as communication ... Read More

What is Intel 8089 IOP?

Ginni
Updated on 24-Jul-2021 07:10:27

2K+ Views

The Intel 8089 l/0 processor is contained in a 40-pin integrated circuit package. Within the 8089 are two independent units called channels. Each channel combines the general characteristics of a processor unit with those of a direct memory access controller.The 8089 is designed to function as an IOP in a microcomputer system where the Intel 8086 microprocessor is used as the CPU. The 8086 CPU initiates an l/0 operation by building a message in memory that describes the function to be performed. The 8089 IOP reads the message from memory, carries out the operation, and notifies the CPU when it ... Read More

What is IBM 370 I/0 Channel?

Ginni
Updated on 24-Jul-2021 07:08:36

595 Views

The I/O processor in the IBM 370 computer is known as a channel. A general computer system configuration contains multiple channels with each channel connected to one or more I/O devices.There are three types of channels including a multiplexer, selector, and block-multiplexer. The multiplexer channel can be linked to multiple slow and medium-speed devices and is adequate for operating with several I/O devices together.The selector channel is created to manage one I/O operation at a time and is generally used to control one high-speed device. The block-multiplexer channel merges the features of both the multiplexer and selector channels. It supports ... Read More

What is Daisy Chaining Priority in computer architecture?

Ginni
Updated on 24-Jul-2021 07:05:18

10K+ Views

The daisy-chaining method of creating priority includes a serial connection of all devices that request an interrupt. The device with the highest priority is located in the first position, followed by lower-priority devices up to the device with the lowest priority, which is situated last in the chain. This technique of connection between three devices and the CPU.The interrupt request line is average to all devices and design a wired logic connection. If some device has its interrupt signal in the low-level state, the interrupt line goes to the low-level state and enables the interrupt input in the CPU. When ... Read More

Advertisements