-->

ABOUT US

Our development agency is committed to providing you the best service.

OUR TEAM

The awesome people behind our brand ... and their life motto.

  • Kumar Atul Jaiswal

    Ethical Hacker

    Hacking is a Speed of Innovation And Technology with Romance.

  • Kumar Atul Jaiswal

    CEO Of Hacking Truth

    Loopholes are every major Security,Just need to Understand it well.

  • Kumar Atul Jaiswal

    Web Developer

    Techonology is the best way to Change Everything, like Mindset Goal.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve their business.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

Showing posts with label computer architecture. Show all posts
Showing posts with label computer architecture. Show all posts
  • Pipelining in Computer Architecture

     

    Pipelining in Computer Architecture



    Parallel Processing


    A Parallel Processing system is able to perform concurrent data processing to achieve faster execution time.

    Example: While an instruction is being executed in the ALU, the next instruction can be read from memory.

    The system may have two or more ALUs and be able to execute two or more instructions at the same time. “So the purpose of
    parallel processing is to speedup the computer processing capabilities.”


    Pipelining Case: Laundry


    4 loads of laundry that need to washed, dried, and folded.

    – 30 minutes to wash, 40 min. to dry, and 20 min. to fold.
    – We have 1 washer, 1 dryer, and 1 folding station.


    What’s the most efficient way to get the 4 loads of laundry done?

     

     

    Pipelining in Computer Architecture

     

     


    Non Pipelined Laundry • Takes a total of 6 hours; nothing is done in parallel


    Pipelined Laundry • Using this method, the laundry would be done at 9:30.

     

     

    Pipelining in Computer Architecture




    Definition 

    Pipelining is an speed up technique where multiple instructions are overlapped in execution on a processor.


    Processors


    Computers, like laundry, typically perform the exact same steps for every  instruction:–


    • Fetch an instruction from memory
    • Decode the instruction
    • Execute the instruction
    • Read memory to get input
    • Write the result back to memory




    Instruction Pipeline



    Instruction execution process lends itself naturally to pipelining
    overlap the subtasks of instruction fetch, decode and execute

    • Fetch instruction (FI)
    • Decode instruction (DI)
    • Calculate operands (CO)
    • Fetch operands (FO)
    • Execute instructions (EI)
    • Write result (WR) Overlap these operations



    Instruction pipeline has six operations



    Instructions Fetch • The IF stage is responsible for obtaining the requested instruction from memory. The instruction and
    the program counter are stored in the register as temporary storage.

    Decode Instruction • The DI stage is responsible for decoding the instruction and sending out the various control lines to
    the other parts of the processor.

    Calculate Operands • The CO stage is where any calculations are performed. The main component in this stage is the ALU.
    The ALU is made up of arithmetic, logic and capabilities.

    Fetch Operands and Execute Instruction • The FO and EI stages are responsible for storing and loading values to and from memory.
    They also responsible for input and output from the processor respectively.

    Write Operands • The WO stage is responsible for writing the result of a calculation, memory access or input into
    the register file.



    Six Stage Instruction Pipeline


    Timing Diagram for Instruction Pipeline Operation

     

     

     

    Pipelining in Computer Architecture


    Pipelining in Computer Architecture


    Pipelining in Computer Architecture

     

     

     

     

    Pipeline Performance: Clock & Timing Si Si+1  m d Clock cycle of the pipeline :  Latch delay : d  = max {m } + d Pipeline
    frequency : f f = 1 /  6


     

    Pipeline Performance: Speedup & Efficiency k-stage pipeline processes n tasks in k + (n-1) clock cycles: k cycles for the first task and n-1 cycles for the remaining n-1 tasks Total time to process n tasks Tk = [ k + (n-1)]

    For the non-pipelined processor T1 = n k Speedup factor Sk = T1 Tk = n k  [ k + (n-1)]  = n k k + (n-1) 7




    Advantages

    Pipelining makes efficient use of resources.
    Quicker time of execution of large number of instructions
    The parallelism is invisible to the programmer.


    Disclaimer

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

     

  • Hierarchy of Memory

     

    Hierarchy of Memory


    Hierarchy of Memory


    Memory hierarchy Main Memory: memory unit that communicates directly with the CPU (RAM). Hierarchy of Memory


    Auxiliary Memory: device that provide backup storage (Disk Drives) Example of auxiliary memory: magnetic disks and tapes.  They are used for storing system programs, large data files, and other backup information  Only program programs and data currently needed by the processor reside in main memory.  All other information is stored in auxiliary memory and transferred to main memory when needed.


    Hierarchy of Memory



    Memory hierarchy system consists of all storage devices from the slow but high-capacity auxiliary memory to relatively faster main memory, to an even smaller and faster cache memory.

    Magnetic tapes used to store removable files and disks used as backup storage.  CPU communicates with auxiliary memory through I/O processor. 

     

    Cache Memory: special very-high-speed memory to increase the processing speed (Cache RAM)

    It is used to compensate the speed differential between main memory access time and processor logic.

    CPU logic is faster than main memory access.

    So small cache employed between CPU and main memory whose access time is close to processor logic clock cycle.

    So it is possible to increase the performance rate of the computer.

    As the storage capacity of the memory increases, the cost per bit for storing binary information decreases and the access time of the memory becomes longer.



    Example


    Auxiliary memory has a large storage capacity, is relatively inexpensive, but has low access speed compared to main memory.

    The cache memory is very small, relatively expensive, and has very high access speed.




    Goal of memory hierarchy


    To obtain the highest-possible average access speed while minimizing the total cost.




    Ratio


    Access time ratio between cache and main memory is about 1 to 7.


    For Example


    Cache memory may have an access time of 100ns, while main memory access time may be 700ns.

    Auxiliary memory average access time is usually 1000 times that of main memory.


    Block Size


    Block size in auxiliary memory typically ranges from 256 to 2048 words, while cache block size is typically from 1 to 16 words.




    Multiprogramming


    Multiprogramming refers to the existence of two or more programs in different parts of the memory hierarchy at the same time.

    For example, when one program is waiting for input or output transfer, there is another program ready to utilize the CPU.




    Memory management


    A program with its data normally resides in auxiliary memory. When the program or a segment of the program is to be executed, it is transferred to main memory to be executed by the CPU.  It is the task of the operating system to maintain in main memory a portion of this information that is currently active.
    3.  The part of the computer system that supervises the flow of information between auxiliary memory and main memory is called the memory management system.





    Disclaimer

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

     

  • Difference between RISC and CISC

     

    Difference between RISC and CISC


    What Is RISC?



    Reduction Instruction Set Computer (RISC) is a multiprocessor particularly designed to process limited computer instructions in order to operate at a much higher speed. On any given system, there are many programs and many instructions being executed. It was discovered that only 10% of all instructions were frequently executed, and that the other 90% clogged the pipeline, thus contributing to the system slowness.



    What Is CISC?



    Unlike the RISC model, Complex Instruction Set Computer (CISC) is a processor which is developed with a full (i.e. complex) set of instructions. The aim with this full instruction set is to provide the full processor capacity in the most efficient manner. RISC models proved, however, that better efficiency was achieved by reducing the set of instructions. 




    Difference between RISC and CISC

     

    RISC


    • Richer instruction set, some simple, some very complex.
    • Instructions generally take more than 1 clock to execute.
    • Instructions of a variable size.
    • Instruction interface with memory in multiple mechanism with complex addressing modes.
    • No pipelining
    • Upward compatibility with a family
    • Microcode control
    • Work well with simpler compiler.

     



    CISC



    • Simple primitive instructions and addressing modes.
    • Instructions execute in one clock cycle.
    • Uniformed length instructions and fixed instructions format.
    • Pipelining.
    • Instructions set is orthogonal (little overlapping of instructions functionality).
    • Hardwired control.
    • Complexity pushed to the compiler.





    Disclaimer

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

     


  • General Purpose Register



     

     

    What is a register?


    A register is one of a small set of data holding places that are part of a computer processor .



    A register may hold :

    a computer instruction
    a storage address
    or any kind of data (such as a bit sequence or individual characters)


    About Registers

    Rarely more than 64 registers in number.
    Small in size
    Typically a register is less than 64 bits in size



    General Purpose Registers Four general-purpose registers:

    1. AX
    2. BX
    3. CX
    4. DX




    AX (Accumulator)


    This is accumulator register. It is of 16 bits and is divided into two 8-bit registers AH and AL to also perform 8-bit instructions. It is used in arithmetic, logic and data transfer instructions in 8086 microprocessors. In manipulation and division, one of the numbers involved must be in AX or AL.




    BX (Base Register)


    This is the base register. It is of 16 bits and is divided into two 8-bit registers BH and BL. BX register is an address register. It usually contains a data pointer used for based, based indexed or register indirect addressing.




    CX (Count register)


    This is Count register. It is of 16 bits and is divided into two 8-bit registers CH and CL to also perform 8-bit instructions. This serves as a loop counter. Program loop constructions are facilitated by it. Count register can also be used as a counter in string manipulation and shift/rotate instruction.    




    DX (Data Register)


    This is data register. It is of 16 bits and is divided into two 8-bit registers DH and DL to also perform 8-bit instructions. Data register can be used as a port number in I/O operations. It is also used in multiplication and division.    




    SP (Stack Pointer)


    This is stack pointer register pointing to program stack. It is used in conjunction with SS for accessing the stack segment.  It is of 16 bits. It points to the topmost item of the stack. If the stack is empty the stack pointer will be (FFFE)H. Its offset address is relative to the stack segment.



    BP (Base Pointer)


    This is base pointer register pointing to data in stack segment. Unlike SP, we can use BP to access data in the other segments. It is of 16 bits. It is primarily used in accessing parameters passed by the stack. Its offset address is relative to the stack segment.




    SI (Source Index)


    This is source index register which is used to point to memory locations in the data segment addressed by DS. Thus, when we increment the contents of SI, we can easily access consecutive memory locations.  It is of 16 bits. Its offset is relative to the data segment.



    DI (Destination Index)


    This is destination index register performs the same function as SI. There is a class of instructions called string operations, that use DI to access the memory locations addressed by ES.


     

     

    Disclaimer

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

     

     

  • WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    Hacking Truth.in

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.