• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Subsystems - The internal bus architecture

Extracts from this document...

Introduction

Computer Subsystems. Task 1 a) The internal bus architecture It is a collection of wires, which the data is transmitted from one part to the other. The internal bus connects all the internal computer components to the CPU and main memory. There are two parts of any bus these are an address bus and the data bus. The size of the bus is measured in width. This is important because it determines the amount of data being transmitted. For example a 16 bit bus can transmit 16 bits of data. Nearly all the PC's today include a local bus for which is needed for faster processing for things such as video data. ...read more.

Middle

At the beginning of a program the Program Counter is set to point at the memory location where the start of the program can be found. After the first instruction has been loaded, the Program Counter is incremented to point at the next instruction, which is then loaded during the next Fetch Decode Execute cycle. The Memory Address Registry (MAR) holds the data or instruction currently being worked out. The Main Memory is where everything is stored on the computer. Every memory address has data or an instruction. The Memory Buffer Registry (MBR) holds the data that was either written to or read from the main memory. ...read more.

Conclusion

And the operating system acts like a translator: enabling the computer's hardware and software to talk to 'foreign' hardware such as printers, scanners and mice. It also allows the application software to 'talk' to the computer hardware. The fetch decode and execute cycle is used with the operating system to control programs and such by the CPU fetching a program from Main Memory decoding it so it can be run by the computer. The computer then starts running the program and it then fetches more of the code and brings it to be run then it does this until the program is closed. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Sender of a UDP does not assure the state of UDP message once. If any kind of reliability is needed for the message transmission than it is all implemented in upper layers. IEEE 802 Institute of Electrical and Electronics Engineers 802 is the standard which looks after LAN and metropolitan area networks.

  2. Computer Architecture

    Task 4 (P6) Describe the features of a processor Multi-tasking Multi-tasking is a method where multiple processes are dealt with at once sharing common processing recourses such as a CPU. It involves the CPU assigning which instructions to be carried out first but it only focuses on one instruction at a time.

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    This will reduce the 'fetch' time. This fast-access memory is called 'cache'. It is much faster than RAM but slower than registers. It is also very expensive. How to compare different types of memory Memory can be classified in a whole variety of ways: 1.

  2. Fetch Decode and Execute

    Say for example the data that we fetched was the ASCII value (hexadecimal) of A, this would then be translated into the letter A. Execute: Once the above steps have been completed the processor is ready to execute the command.

  1. Smart Card System

    The main challenges of their job were to create a computer language that could be used to build programs that would run in fundamentally different execution platform ands environments. Because these machines provide a wide variety of hardware and software environments, it was necessary that Java be Platform-independent.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    / EVALUATION OF IMPLEMENTED SYSTEM / / User Documentation * Installation * Use / Index / Bibliography / This gant chart illustrates the intended time period it will take to complete the different sections of my project. By following a gant chart it is easier to plan how long each

  1. Creating a computer system for Wooten Basset Rugby Club

    * System will be run from head coach's lap top computer and therefore not need any network capabilities. * Head coach has copies of Microsoft Access already stored on his computer.

  2. Flexible Architectures in Communication Security Application

    The cipher algorithm first reads the input data, XOR's it with the 128-bit intermediate vector (IV) and key, and then enters the encryption loop. The encryption loop executes 16 iterations (or rounds as they are called in cryptography literature) to produce 128 bits of ciphertext.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work