Solved

Pogram Counter

Posted on 2002-03-26
5
265 Views
Last Modified: 2012-05-04
why there is bidirectional path between "Program Counter" & "Data Bus" in micro processors of Intel Series.
As Memory address of Instruction is placed from Data Bus to Program Counter in one direction What is moved back from Program Counter to Data Bus in reverse direction.
0
Comment
Question by:SairaZaidi
  • 2
5 Comments
 
LVL 2

Accepted Solution

by:
willinois earned 45 total points
ID: 6896449
0
 
LVL 32

Assisted Solution

by:jhance
jhance earned 45 total points
ID: 6896745
There must be a bi-directional path between the PC (program counter) and the data bus on Intel architecture CPUs to support instructions that:

1) Set the PC from an instruction.  Like an absolute JMP.  The data following the JMP opcode is the new PC and must be able to get from the data bus to the PC.

2) Set memory from the PC.  A good example is the CALL instruction.  CALL pushes the PC onto the STACK.  Since the stack is in memory on Intel CPUs, there must be a path from the PC to data bus.

Of course it's possible to have the PC go somewhere else BEFORE sending it to the data bus and therefore eliminate the direct PC <--> data bus path but the frequency of such instructions as noted above would make this missing path a major bottleneck.

CPU architecture designers spend a lot of time modelling things to figure out where the bottlenecks are and how to best eliminate them.
0
 
LVL 6

Expert Comment

by:akboss
ID: 8954962
============================
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:
Accept a comment Split between willinois and jhance .
Please leave any comments here within the next seven days.
 
PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!
 
akboss
EE Cleanup Volunteer
============================
0
 
LVL 32

Expert Comment

by:jhance
ID: 8955339
Do it.  This question has been hanging for > 1 year!!!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
In this article we have discussed the manual scenarios to recover data from Windows 10 through some backup and recovery tools which are offered by it.
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now