• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

John von Neumann

Extracts from this document...

Introduction

John von Neumann Von Neumann, a mathematician designed the architecture model for a CPU. This model was a single storage structure to hold both the set of instructions on how to perform the computation and the data required or generated by the computation. He designed it by treating the instructions in the same way as the data, a stored-program machine can easily change the instructions. In other words the machine is reprogrammable. Von Neumann's archtectre is still used it todays modern CPU'S. The CPU This diagram represents the structure of the Central Processing System. ...read more.

Middle

It also manages the signals from the control bus. Registers This is a form of high-speed memory which is contained inside of the CPU. All data must be represented in a register before it can be processed. Information is stored temporarily in the registers in which text or buffer positions or rectangles can be saved for later use. Buses A bus is a channel or path between the components in a computer. Having a high-speed bus is important. ...read more.

Conclusion

The first connects the CPU and the system memory. This is the fastest bus in the system. The second bus is the slower and it connects other devices, like the hard disk, CD drive, graphics card etc. These slower buses connect to the system bus through a bridge which integrating the data from the other buses to the system bus. RAM Random Access Memory is the place in a computer where the operating system, application programs, and data in current use are kept temporarily so that they can be quickly reached by the computer's processor. The RAM is plugged on to the mother board and the processor accesses the RAM via buses. Kris Littlewood ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    can be greater, consequently that the amount that can be stored is greater and that the access times are much faster. The hard drive is likely to be the main secondary storage for a computer system, having very large storage capacities.

  2. Computer Architecture

    Now we know how a full adder works we can now relate this to the idea of 4 full adders joined together by the last carry out and the diagram below illustrates this. Diagram 1 These diagrams (below) will show you how you can add two four bit binary numbers together using a logic circuit.

  1. The Data Management Structure: Components and the data structure

    However, it did not prove to be a cure-all. Network Databases Network databases were primarily designed to overcome the limitations of the Hierarchical model without creating a radical departure to the way the databases were structured. Thus in more that one ways, Network databases still behave like Hierarchical databases.

  2. Smart Card System

    damaged in transmit, or it could send a message to the wrong place. It is both more efficient and safer to have TCP compute a separate checksum for the TCP header and data. IP addresses are used to deliver packets of data across a network and have what is termed end-to-end significance.

  1. According to John Searle, strong analytical devices that have Artificial Intelligence can, at most, ...

    A third batch of Chinese symbols and more instructions in English enable you "to correlate elements of this third batch with elements of the first two batches" and instruct you, thereby, "to give back certain sorts of Chinese symbols with certain sorts of shapes in response."

  2. Flexible Architectures in Communication Security Application

    Figure 2. SSL Protocol Relative Contribution to Run Time. Lisa Wu Page 11 4/22/01 sessions fast public-key cipher processing is crucial for high transaction throughput. A recent study [2] found that the average size of a web object was 21k bytes.

  1. Internal Operations

    * 27 - this is a little more difficult and so have shown my workings: 27 - 128 = 0 27 - 64 = 0 27 - 32 = 0 27 - 16 = 11 = 1 11 - 8 = 3 = 1 3 - 4 = 0 3

  2. The Von Neumann Machine

    Newer processors may have 24,32 or even bigger address buses. A 32-bit address bus would allow access to 2^32 (4294967296) different location which is 4 gigabytes of memory. The bus system determines the size of each memory location and it also determines how much memory can be installed in the system.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work