Chapter 2 Data Manipulation Yonsei University 1 st Semester, 2015 Sanghyun Park.

Slides:



Advertisements
Similar presentations
Chapter 2: Data Manipulation
Advertisements

Chapter 2 Data Manipulation Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University 1 Some sldes are adapted from.
 Suppose for a moment that you were asked to perform a task and were given the following list of instructions to perform:
Processor System Architecture
Computer Architecture and Data Manipulation Chapter 3.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Chapter.
Room: E-3-31 Phone: Dr Masri Ayob TK 2123 COMPUTER ORGANISATION & ARCHITECTURE Lecture 5: CPU and Memory.
CHAPTER 4 COMPUTER SYSTEM – Von Neumann Model
Chapter 5: Computer Systems Organization Invitation to Computer Science, Java Version, Third Edition.
1 Sec (2.1) Computer Architectures. 2 For temporary storage of information, the CPU contains cells, or registers, that are conceptually similar to main.
Chapter 0 Introduction to Computing
Data Manipulation Computer System consists of the following parts:
CSCE 121, Sec 200, 507, 508 Fall 2010 Prof. Jennifer L. Welch.
Chapter 4 Processor Technology and Architecture. Chapter goals Describe CPU instruction and execution cycles Explain how primitive CPU instructions are.
Chapter 2.2 Machine Language.
1 Sec (2.3) Program Execution. 2 In the CPU we have CU and ALU, in CU there are two special purpose registers: 1. Instruction Register 2. Program Counter.
Lecture 3. Diff b/w RAM and Registers Registers are used to hold data immediately applicable to the operation at hand Registers are used to hold data.
CS 1308 Computer Literacy and the Internet Computer Systems Organization.
CPU Computer Hardware Organization (How does the computer look from inside?) Register file ALU PC System bus Memory bus Main memory Bus interface I/O bridge.
Chapter 5: Computer Systems Organization Invitation to Computer Science, Java Version, Third Edition.
Data Manipulation, Communication and Architecture Fall 2012.
Data manipulation, Part one Introduction to computer, 2nd semester, 2010/2011 Mr.Nael Aburas Faculty of Information.
Ch. 2 Data Manipulation 4 The central processing unit. 4 The stored-program concept. 4 Program execution. 4 Other architectures. 4 Arithmetic/logic instructions.
Computer Architecture Lecture 2 System Buses. Program Concept Hardwired systems are inflexible General purpose hardware can do different tasks, given.
CS 111 – Sept. 15 Chapter 2 – Manipulating data by performing instructions “What is going on in the CPU?” Commitment: –Please read through section 2.3.
Important Concepts  Parts of the CPU  Arithmetic/Logic Unit  Control Unit  Registers  Program Counter  Instruction Register  Fetch/Decode/Execute.
Chapter 2 Data Manipulation © 2007 Pearson Addison-Wesley. All rights reserved.
ECEG-3202 Computer Architecture and Organization Chapter 3 Top Level View of Computer Function and Interconnection.
Chapter 4 MARIE: An Introduction to a Simple Computer.
Chapter 2 Data Manipulation. © 2005 Pearson Addison-Wesley. All rights reserved 2-2 Chapter 2: Data Manipulation 2.1 Computer Architecture 2.2 Machine.
Data Manipulation CSC Overview  Computer Architecture  Machine Language  Computer Architecture  Machine Language.
Copyright © 2015 Pearson Education, Inc. Chapter 2: Data Manipulation.
Computer Hardware A computer is made of internal components Central Processor Unit Internal External and external components.
Computer Architecture 2 nd year (computer and Information Sc.)
Electronic Analog Computer Dr. Amin Danial Asham by.
CS 1308 Computer Literacy and the Internet. Objectives In this chapter, you will learn about:  The components of a computer system  Putting all the.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Data Manipulation Brookshear, J.G. (2012) Computer Science: an Overview.
Chapter 2 Data Manipulation © 2007 Pearson Addison-Wesley. All rights reserved.
Data Manipulation, part two Introduction to computer, 2 nd semester, 2010/2011 Mr.Nael Aburas Faculty of Information.
Chapter 2 Data Manipulation © 2007 Pearson Addison-Wesley. All rights reserved.
Chapter 2: Data Manipulation
Question What technology differentiates the different stages a computer had gone through from generation 1 to present?
CMSC 104, Lecture 061 Stored Programs A look at how programs are executed.
Chapter 2 Data Manipulation © 2007 Pearson Addison-Wesley. All rights reserved.
Chapter 2 Data Manipulation © 2007 Pearson Addison-Wesley. All rights reserved.
27 October 2015 Birkbeck College, U. London1 Introduction to Computer Systems Lecturer: Steve Maybank Department of Computer Science and Information Systems.
1 Chapter 1 Basic Structures Of Computers. Computer : Introduction A computer is an electronic machine,devised for performing calculations and controlling.
© 2015 Pearson Education Limited 2015 Quiz in last 15 minutes Midterm 1 is next Sunday Assignment 1 due today at 4pm Assignment 2 will be up today; due.
Chapter 2: Data Manipulation
Chapter 2: Data Manipulation
Edexcel GCSE Computer Science Topic 15 - The Processor (CPU)
CS149D Elements of Computer Science
Computer Architecture
CSCE Fall 2013 Prof. Jennifer L. Welch.
ECEG-3202 Computer Architecture and Organization
Chapter 2: Data Manipulation
Chapter 5: Computer Systems Organization
BIC 10503: COMPUTER ARCHITECTURE
CSCE Fall 2012 Prof. Jennifer L. Welch.
Chapter 2: Data Manipulation
Machine Language.
Chapter 2: Data Manipulation
Sec (2.3) Program Execution.
Presentation transcript:

Chapter 2 Data Manipulation Yonsei University 1 st Semester, 2015 Sanghyun Park

Outline  Computer Architecture  Machine Language  Program Execution  Arithmetic/Logic Instructions  Communicating With Other Devices

Computer Architecture  The central processing unit, or ____ is a main part of the computer  CPU consists of two parts:  Arithmetic/logic unit: performs data __________  Control unit: __________ the machine’s activities  CPU contains cells, or ________, for temporary storage of information  For the purpose of transferring bit patterns, a machine’s CPU and main memory are connected by a collection of wires called a ____

CPU and Main Memory

Stored Program Concept  Program (instructions) is stored in _______ instead of being built into the control unit as part of the machine  Adding values stored in memory

Machine Language (1/2)  CPUs are designed to recognize __________ encoded as bit patterns  This collection of instructions along with the encoding system is called the machine _________  An instruction expressed in this language is called a _________ instruction

Machine Language (2/2)  Two philosophies of CPU design:  CPU should be designed to execute a _______ set of machine instructions: leads to a ______ instruction set computer (_____)  CPU should have the ability to execute a ______ number of complex instructions: leads to a ________ instruction set computer (_____)  Machine instructions can be classified as:  Data transfer: LOAD, STORE, I/O instructions  Arithmetic/Logic: arithmetic/logic operations, SHIFT, ROTATE  Control: conditional or unconditional JUMP

An illustrative Machine Language (1/3)  The architecture of the machine for the discussion

An illustrative Machine Language (2/3)  The encoded version of a machine instruction consists of two parts:  _______ (short for operation code) field: indicates which of the elementary operations is requested by the instruction  ____________: provides more detailed information about the operation specified by the op-code  The entire machine language of the illustrative machine consists of only 12 basic instructions  Each of these instructions is encoded using a total of 16 bits, represented by ____ hexadecimal digits

An illustrative Machine Language (3/3)

Decoding the Instruction 35A7

An Encoded Version of the Instructions in Figure 2.2

Program Execution (1/2)  A computer follows a program stored in its memory by copying the instructions from memory into the control unit as needed  The order in which the instructions are fetched from memory corresponds to the order in which they are stored in the memory unless otherwise specified by a ______ instruction

Program Execution (2/2)  Within the control unit are two special purpose registers:  The ______________ contains the address of the next instruction to be executed  The _________________ holds the instruction being executed  The control unit performs its job by continually repeating an algorithm through a three-step process known as the _____________

Machine Cycle

An Example of Program Execution (1/3)

An Example of Program Execution (2/3)

An Example of Program Execution (3/3)

Arithmetic/Logic Operations AND OR XOR _________________________ AND OR XOR _________________________

Rotating to the Right

Communicating with Other Devices (1/5)  The main memory and CPU form the _____ of a computer  Communication between a computer and other devices is normally handled through an intermediary device known as a ________  From there the controller connects via ______ to peripheral devices

Communicating with Other Devices (2/5)  These controllers are often small _________ within themselves, each with its own memory circuitry and CPU that performs a program  A controller _______ messages and data back and forth between forms compatible with the internal characteristics of the computer and those of the peripheral device

Communicating with Other Devices (3/5)

Communicating with Other Devices (4/5)  The CPU is able to communicate with the _________ in the same manner that it communicates with main memory  I/O instructions _______ the various controllers by an _________ system similar to that of main memory  The set of addresses assigned to a controller are called a _____  An alternative is _________________ in which each controller is designed to respond to references to a unique set of main memory addresses

Communicating with Other Devices (5/5)