• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Subsystems - The internal bus architecture

Extracts from this document...

Introduction

Computer Subsystems. Task 1 a) The internal bus architecture It is a collection of wires, which the data is transmitted from one part to the other. The internal bus connects all the internal computer components to the CPU and main memory. There are two parts of any bus these are an address bus and the data bus. The size of the bus is measured in width. This is important because it determines the amount of data being transmitted. For example a 16 bit bus can transmit 16 bits of data. Nearly all the PC's today include a local bus for which is needed for faster processing for things such as video data. ...read more.

Middle

At the beginning of a program the Program Counter is set to point at the memory location where the start of the program can be found. After the first instruction has been loaded, the Program Counter is incremented to point at the next instruction, which is then loaded during the next Fetch Decode Execute cycle. The Memory Address Registry (MAR) holds the data or instruction currently being worked out. The Main Memory is where everything is stored on the computer. Every memory address has data or an instruction. The Memory Buffer Registry (MBR) holds the data that was either written to or read from the main memory. ...read more.

Conclusion

And the operating system acts like a translator: enabling the computer's hardware and software to talk to 'foreign' hardware such as printers, scanners and mice. It also allows the application software to 'talk' to the computer hardware. The fetch decode and execute cycle is used with the operating system to control programs and such by the CPU fetching a program from Main Memory decoding it so it can be run by the computer. The computer then starts running the program and it then fetches more of the code and brings it to be run then it does this until the program is closed. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    UDP Stands for User Datagram Protocol, this an internet protocol used for datagram services. This protocol allows computers on a network to send short messages to one another which is also known as datagram. Opposite to TCP/IP it does not guarantee the reliability and delivery of the message and packets the order they are sent in.

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    ==> Cache It is provided in computer systems to speed up processing and like all memory it is measured in bytes. Programs are made up of instructions. These are fetched from memory using the fetch-decode-execute cycle. The data that instructions need is also fetched from memory and some data might need to be fetched over and over again.

  1. Computer Architecture

    Data Buses - the mechanism that moves information around a computer. 5. Address Buffer - this holds the address part of the instruction register, 6. Program Counter - this contains the location of the next instruction to be executed and, therefore, keeps track of where the computer is up to in a program.

  2. Fetch Decode and Execute

    But how does the processor know what action it is supposed to take with the data? Well, in the conversion process the data is assigned what is known as an operand. This is a data that tells the processor whether it is to print, multiply add and so on.

  1. Smart Card System

    * Exportable (in binary form only). * Single distribution of the JCE 1.2.1 software from Sun Microsystems for both domestic and global users, with jurisdiction policy files that specify that there are no restrictions on cryptographic strengths. 2.6 Conclusions DES is available in software as content-encryption algorithm.

  2. Flexible Architectures in Communication Security Application

    Parallelism in the cipher (especially coarse-grained parallelism) would imply that some aspect of the computation does not affect later ciphertext results, which would in turn imply that the cipher algorithm was not a strong one! While we did find a small level of ILP in cipher kernels, the process of making the kernels run fast primarily entails improving their execution efficiency on the underlying microarchitecture.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    However the system is confusing and fairly inefficient. A main drawback of the system is that it is not centralized as such, whilst most parts are paper based there is computer work which means manipulation of data from the paper and requires it to be inserted into the computer.

  2. Creating a computer system for Wooten Basset Rugby Club

    Invitation letter to other clubs inviting them to a match. * Player and parent data. Store contact details about players and parents. * Statistics. Store statistics on players including points scored, tries and appearances. * Team information. Store details on rival teams such as contact details.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work