• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Subsystems - The internal bus architecture

Extracts from this document...

Introduction

Computer Subsystems. Task 1 a) The internal bus architecture It is a collection of wires, which the data is transmitted from one part to the other. The internal bus connects all the internal computer components to the CPU and main memory. There are two parts of any bus these are an address bus and the data bus. The size of the bus is measured in width. This is important because it determines the amount of data being transmitted. For example a 16 bit bus can transmit 16 bits of data. Nearly all the PC's today include a local bus for which is needed for faster processing for things such as video data. ...read more.

Middle

At the beginning of a program the Program Counter is set to point at the memory location where the start of the program can be found. After the first instruction has been loaded, the Program Counter is incremented to point at the next instruction, which is then loaded during the next Fetch Decode Execute cycle. The Memory Address Registry (MAR) holds the data or instruction currently being worked out. The Main Memory is where everything is stored on the computer. Every memory address has data or an instruction. The Memory Buffer Registry (MBR) holds the data that was either written to or read from the main memory. ...read more.

Conclusion

And the operating system acts like a translator: enabling the computer's hardware and software to talk to 'foreign' hardware such as printers, scanners and mice. It also allows the application software to 'talk' to the computer hardware. The fetch decode and execute cycle is used with the operating system to control programs and such by the CPU fetching a program from Main Memory decoding it so it can be run by the computer. The computer then starts running the program and it then fetches more of the code and brings it to be run then it does this until the program is closed. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    When a client configured by DHCP connects to the network it automatically sends a broadcast query asking for the required information to the DHCP server. The IP address and information about the client configuration such as the gateway, domain name & etc, is all managed by the DHCP server.

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    For example, a constant that is held in memory and is used lots of time in lots of calculations. Fetching data from IAS takes time. Fetching the same data time after time is a waste of time. Processing can be speeded up by storing constantly needed data in some very fast-access memory.

  1. Fetch Decode and Execute

    But how does the processor know what action it is supposed to take with the data? Well, in the conversion process the data is assigned what is known as an operand. This is a data that tells the processor whether it is to print, multiply add and so on.

  2. Computer Architecture

    Data Buses - the mechanism that moves information around a computer. 5. Address Buffer - this holds the address part of the instruction register, 6. Program Counter - this contains the location of the next instruction to be executed and, therefore, keeps track of where the computer is up to in a program.

  1. White Soul System Designs - creating a computer system.

    I will be looking into detail what I could have made better or easier to use and I will write down everything I think I could improve on and the areas where I think I may have gone wrong 31/03/03 User Documentation I will go into detail talking about my program and how to use it.

  2. Creating a computer system for Wooten Basset Rugby Club

    * Create leagues of the club's leading scorers and those with the worst disciplinary records. * Store data about what type of training each player is on. For example some players may have fitness training or others forwards training. * Monitor finances for each fixture.

  1. Smart Card System

    Individuals who practice this field are known as cryptographers. Cryptography mainly consists of four objectives: * Confidentially - The information cannot be understood by anyone. * Integrity - The information cannot be altered in storage or transit between sender and receiver. * No-repudiation - The creator or sender of the information cannot deny his intentions in the creation or transmission of the information.

  2. Flexible Architectures in Communication Security Application

    A software only approach is the lowest-cost solution but with accordingly lower performance. An example of the hardware-only approach is the IDEA engine [23]. It is targeted specifically at the efficient execution of the IDEA cipher and renders excellent performance.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work