• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11

Computer Architecture

Extracts from this document...

Introduction

UNIT 9 - COMPUTER ARCHITECTURE Assignment 3 Table of Contents Task 1 3 Von Neumann Architecture 3 Definitions 3 Current Architectures 4 Task 2 5 Microprocessor 5 Memory 6 Pipelining 6 Parallel Processing 7 Task 3 8 Fetch - Decode - Execute 9 Task 4 10 Core Duo vs. G5 10 Bibliography 11 TASK 1 Von Neumann Architecture Definitions (Wikipedia n.d.) Memory - Where the data to be read or executed is located. Control Unit - The control unit coordinates and controls all the operations carried out by the computer. It operates by repeating three operations: fetch, decode and execute. ALU (accumulator) - The ALU can perform two sorts of operations on data. Arithmetic operations include addition, subtraction, multiplication and division. Logical operations consist of comparing one data item with another to determine whether the first data is smaller than, equal to or greater than the second data item. Arithmetic - Add, Subtract Logic - If Greater than, If less than Data manipulation - Move command, Input command Flow Control - Go to command, Brach off command Input - Data is sent to the input when it is called. Output - Data is outputted when it has been executed. ...read more.

Middle

However, this type of parallel processing requires very sophisticated software called distributed processing software. TASK 3 Op-Code (1 byte) Operand (3 bytes) Meaning 01 Memory address Load Register A with the contents of the 4 bytes of memory starting at the address defined in the Operand 02 Memory address Load Register B with the contents of the 4 bytes of memory starting at the address defined in the Operand 06 Not used (Set to 000000) Add the contents of the Register A to Register B and store the result in Register C 05 Memory address Store the contents of Register C at the 4 bytes of memory starting at the address defined by the Operand A program written for this microprocessor consists of the following 4 instructions (shown in hex): 01000250 02000254 06000000 05000258 Address 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F 000200 01 00 02 50 02 00 02 54 06 00 00 00 05 00 02 58 000210 000220 000230 000240 000250 00 00 00 FF 00 00 01 00 00 00 01 FF Program Counter (Hex) Instruction Register (Hex) A (Hex) B (Hex) C (Hex) ...read more.

Conclusion

For the majority of performance tests that I conducted on the iMacs, leaving the G5 set to Automatic actually gave me performance within about 3% of the system's performance if I set the energy saver setting to Highest. However, there were some benchmarks where the iMac incorrectly would not increase CPU frequency in order to accommodate a very high demand task. The best example that I could find was my QuickTime Pro 7 H.264 encoding test. With the G5 running in Automatic mode, the test took over 25 minutes to complete, compared to 9.8 minutes for the Core Duo. Setting the processor performance to Highest, the G5's time dropped down to a more respectable 12.3 minutes, a reduction of more than 50%! The goal of the Automatic processor performance setting should be to crank up CPU frequency when it's needed, and scale it back when it's not. The results that I saw in my QuickTime test show that it fails at that goal in a major way, which isn't acceptable. There were a few other isolated cases where the same was true, forcing me to leave the iMac G5 in its highest performance state for all of my performance tests. In conclusion to this review I found that the Core Duo processor is far more effective and is even slightly cheaper than the G5 version. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. communication and values

    The carer need to think carefully before talks about clients. Clients can expect the carer not to discuss their details with anyone else without their permission. There are also legal requirements to keep personal records confidential. The Data Protection Act 1998 states that data has to be secure, accurate and that it can only be used for limited purposes.

  2. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    * A search is required for all future orders for a particular customer based on customer surname. This is needed in the event that a customer forgets their order. Information Requirements * Information needed for the proposed system includes details of current customers, orders and products.

  1. Threats to Data

    When the data is retrieved a reverse algorithm is used to make it make sense again. Most encryption algorithms are based on a key, a secret number which must be supplied along with the algorithm. This means a hacker would not only need to know the algorithm but also the key before he could translate the data.

  2. Assignment 2 Set up a Computer System

    The user must use the scroll bar and search for the programme "Utility Manager". Once this programme has been found, the user must select this programme and continue by "clicking" "Next" Button. (See image 2.4) Image 2.4 This picture is the next box here you can chose when you want

  1. Custom Load Trucking

    ROM Drive * 19" TFT Flat Panel Screen * Logitech Multimedia Keyboard * Logitech Optical Mouse * Creative Inspire 6100 5.1 Speaker System * 10/100/1000 Ethernet LAN * 12 x USB2 Ports * Firewire The estimated price of the computer is about �749.

  2. User Guide. This system is for Regs Second Hand Cars. This user guide will ...

    2. Once you have selected the certain customer and car details, now you have to select the deposit amount that the customer is willing to give. You can do this by simply typing in the amount or using the spinners to come to the correct amount.

  1. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    The IT technicians need to make sure that data has been properly formatted to prevent others from accessing their data. This also comes under the data protection act because this is all about the personal data held about individuals. RSI RSI stands for repetitive strain injury: this happens when you

  2. Discuss the Causes and Effects of the Digital Divide

    of the information age this is because the internet is the best place to learn a lot of things and people can educate themselves on it. There are many charities devoted into closing the gap and one of the best ways in which to do this is by giving more helpless people old computers that are no longer needed.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work