Ginni has Published 1580 Articles

What is shared-memory model in computer architecture?

Ginni

Ginni

Updated on 24-Jul-2021 07:13:43

5K+ Views

A shared memory model is one in which processors connects by reading and writing locations in a shared memory that is similarly applicable by all processors. Each processor can have registers, buffers, caches, and local memory banks as more memory resources. Some basic issues in the design of shared-memory systems ... Read More

What is Character Oriented Protocol in computer architecture?

Ginni

Ginni

Updated on 24-Jul-2021 07:12:44

2K+ Views

The character-oriented protocol is depends the binary code of a character set. The code generally used is ASCII (American Standard Code for Information Interchange). It is a 7-bit code with an eighth bit used for parity. The code has 128 characters, of which 95 are graphic characters and 33 are ... Read More

What is Intel 8089 IOP?

Ginni

Ginni

Updated on 24-Jul-2021 07:10:27

2K+ Views

The Intel 8089 l/0 processor is contained in a 40-pin integrated circuit package. Within the 8089 are two independent units called channels. Each channel combines the general characteristics of a processor unit with those of a direct memory access controller.The 8089 is designed to function as an IOP in a ... Read More

What is IBM 370 I/0 Channel?

Ginni

Ginni

Updated on 24-Jul-2021 07:08:36

595 Views

The I/O processor in the IBM 370 computer is known as a channel. A general computer system configuration contains multiple channels with each channel connected to one or more I/O devices.There are three types of channels including a multiplexer, selector, and block-multiplexer. The multiplexer channel can be linked to multiple ... Read More

What is Daisy Chaining Priority in computer architecture?

Ginni

Ginni

Updated on 24-Jul-2021 07:05:18

10K+ Views

The daisy-chaining method of creating priority includes a serial connection of all devices that request an interrupt. The device with the highest priority is located in the first position, followed by lower-priority devices up to the device with the lowest priority, which is situated last in the chain. This technique ... Read More

What is Asynchronous Serial Transfer in computer architecture?

Ginni

Ginni

Updated on 24-Jul-2021 07:02:13

2K+ Views

The transfer of data between two units can be finished in parallel or serial. In parallel data transmission, each bit of the message has its direction, and the complete message is sent at a similar time. This defines that an n-bit message should be sent through n separate conductor paths.In ... Read More

What is Strobe Control?

Ginni

Ginni

Updated on 24-Jul-2021 06:59:23

9K+ Views

The strobe control technique of asynchronous data transfer operates a single control line to time each transfer. The strobe can be activated by either the source or the destination unit. The diagram shows a source-initiated transfer.The data bus gives the binary data from the source unit to the destination unit. ... Read More

What is Asynchronous Data Transfer in Computer Architecture?

Ginni

Ginni

Updated on 24-Jul-2021 06:55:36

4K+ Views

In this transmission, signals are sent between the computers and external systems or vice versa asynchronously. This generally defines data that is sent at infrequent intervals instead of in a steady stream, which represents that the first element of the execute file might not ever be the first to be ... Read More

What is the difference between Isolated and memory-mapped I/O?

Ginni

Ginni

Updated on 24-Jul-2021 06:53:13

4K+ Views

Isolated I/OIn the isolated I/O configurations, the CPU has definite input and output instructions, and each of these instructions is related to the address of an interface register. When the CPU fetches and decodes the operation code of an input or output instruction, it locates the address related to the ... Read More

What are the uses of multibyte data organization in computer architecture?

Ginni

Ginni

Updated on 24-Jul-2021 06:51:13

434 Views

There are two commonly used for organizations for multibyte data such as big-endian and little-endian. In the big-endian format, the most important byte of a value is saved in location X, the following byte in location X + 1, and so on. For example, the hexadecimal value 0102 0304H (H ... Read More

Advertisements