Chapter 10 Instruction Set: Charateristics and Functions
2016-12-30 19:00
405 查看
Instruction Set:
The collection of instructions that a CPU can execute:
The instruction set determines the function of CPU
Element of an instrction
Operation code(Op code)
Source operand reference
Result operand reference
Next instruction reference
Operands are stored in cache or main memeory or virtual memory, CPU registers, I/O devices.
Instruction types:
Data processing
Data storage(main memory)
Data movement(I/O)
Program flow control: test and branch
Number of addresses
4 addresses
A4 is next instruction address
3 addresses
Next instruction address is usually implicit
2 addresses
1 address
Implicit second address: usually a register(accumulator, AC)
0 address: Op code
All addresses are implicit or no address
Uses a stack
Types of operands
Address
Numbers
Characters
Logical data
Types of operations
Data transfer: the most fundamental
Specify
Source
Destination: registers, memory, top of stack
Amount of data
Mode of addressing
Arithmetic
Logical
Conversion
Translate: some values in memory are converted by table query
Convert: base conversion
I/O
System control
Transfer of control
MMX: A set of highly optimized instructions for multimedia applications
SIMD execution model
SIMD allows the same operation to be carried out on multiple data elements in parallel. The MMX technology supports parallel opertions on byte, word, and doubleword data elements which contained in MMX registers.
Wraparound & Saturation arithmetic
Wraparound arithmetic: the extra bit is truncated when overflow occurs.
Saturation arithmetic: When overflow or underflow happens, the result is set to the largest or smallest value representable
The collection of instructions that a CPU can execute:
The instruction set determines the function of CPU
Element of an instrction
Operation code(Op code)
Source operand reference
Result operand reference
Next instruction reference
Operands are stored in cache or main memeory or virtual memory, CPU registers, I/O devices.
Instruction types:
Data processing
Data storage(main memory)
Data movement(I/O)
Program flow control: test and branch
Number of addresses
4 addresses
A4 is next instruction address
3 addresses
Next instruction address is usually implicit
2 addresses
1 address
Implicit second address: usually a register(accumulator, AC)
0 address: Op code
All addresses are implicit or no address
Uses a stack
Types of operands
Address
Numbers
Characters
Logical data
Types of operations
Data transfer: the most fundamental
Specify
Source
Destination: registers, memory, top of stack
Amount of data
Mode of addressing
Arithmetic
Logical
Conversion
Translate: some values in memory are converted by table query
Convert: base conversion
I/O
System control
Transfer of control
MMX: A set of highly optimized instructions for multimedia applications
SIMD execution model
SIMD allows the same operation to be carried out on multiple data elements in parallel. The MMX technology supports parallel opertions on byte, word, and doubleword data elements which contained in MMX registers.
Wraparound & Saturation arithmetic
Wraparound arithmetic: the extra bit is truncated when overflow occurs.
Saturation arithmetic: When overflow or underflow happens, the result is set to the largest or smallest value representable
相关文章推荐
- Chapter 4– Functions and Program Structure of TCPL (Part 10)
- Chapter 11 Instruction Set: Addressing Modes and Formats
- Chapter 3 Functions and Pointers
- Chapter 4 - Functions and Program Structure(四)
- Learning with python: Chapter3~4 Functions,Conditionals and Recursion
- More on Variables and Data Types(Chapter 10 of Programming in Objective-C 2.0)
- Chapter 4 - Functions and Program Structure(四)
- Chapter 4– Functions and Program Structure of TCPL (Part 11)
- Chapter 5 Data Hiding and Member Functions
- Chapter 4 - Functions and Program Structure(五)
- MySQL 5.7 Reference Manual Chapter 13 Functions and Operators 参考手册第十三章函数与操作符内容总结
- Chapter 4 - Functions and Program Structure(五)
- C Standard Library: 10 Date and Time Functions: <time.h>
- Chapter 4 - Functions and Program Structure(六)
- Chapter 1 Securing Your Server and Network(10):使用扩展保护避免授权中继攻击
- Chapter 4 - Functions and Program Structure(六)
- Chapter 1 Securing Your Server and Network(10):使用扩展保护避免授权中继攻击
- Chapter 1 Securing Your Server and Network(10):使用扩展保护避免授权中继攻击
- Chapter 4 - Functions and Program Structure(一)
- Chapter 04-Using Conversion Functions and Conditional Expressions-Nesting Functions