Verified Document

Computer System Architecture Research Paper

Evolution of System Performance: RISC, pipelining, cache memory, virtual memory

Historically, improvements in computer system performance have encompassed two distinct factors: improvements in speed and also improvements in the number of applications which can be run by the system. Of course, the two are interlinked given that high levels of speed are linked to expansions of short-term memory and the ability of computers to use that memory to perform critical functions. One notable early improvement in computer functionality was the development of RISC. RISC is an acronym for Reduced Instruction Set Computer. RISC is characterized by several distinct features, most notably pipelining which is "a technique that allows for simultaneous execution of parts, or stages, of instructions to more efficiently process instructions" and a larger number of registers which allows for the use of more generalized terms to process a wider variety of applications, versus the more specialized ones characteristic of other types of architectures (Chen, Novick & Shimano 2000, What is RISC). Simultaneous execution notably expanded the complexity of applications computers were able to perform. The first RISC processor using pipelining was developed at Stanford University during the early 80s along with...

The "MIPS processor implemented a smaller, simpler instruction set. Each of the instructions included in the chip design ran in a single clock cycle" (Chen, Novick & Shimano 2000, MOSC).
The history of cache memory also dates back to the 1980s. Before the development of cache memory, all computer memory was slow and expensive, which severely limited its utility on a practical basis. However, the ability of CPU caches to store small amounts of needed short-term memory notably speeded up systems, combined with the development of microprocessors at the same time (Hruska 2014: 1). "The goal of the cache system is to ensure that the CPU has the next bit of data it will need already loaded into cache by the time it goes looking for it" (Hruska 2014:1). The use of memory cache means that the programs and data the computer uses most frequently is easily accessible and thus speeds up access. "By keeping as much of this information as possible in SRAM, the computer avoids accessing the slower DRAM, which makes the computer faster" ("Cache," 2015).

The improvement of virtual memory has been another important asset to computer functioning and utility. When a computer does not have…

Cite this Document:
Copy Bibliography Citation

Related Documents

Payroll System Architecture for a Large Company
Words: 2315 Length: 8 Document Type: Essay

New Payroll Application Architecture One of the most commonly automated business processes and operations in the recent past is payroll, which is also the most often used human resource solution. The increased use and automation of payroll is attributable to the need to ease and reduce the time spent in payroll processes, which is one of the first applications in the working environment. Despite the increased automation of payroll, there are

Computer Science Fundamentals Too Often the Mechanistic
Words: 1481 Length: 5 Document Type: Essay

Computer Science Fundamentals Too often the mechanistic are taken for granted in computer science. The technology has been around long enough now, that many take for granted the great powers that computers and computing technology has afforded modern man and his society. The fundamental characteristics of any successful endeavor should be investigated to help identify a pattern and produce learning and gather information. The purpose of this essay is identify and explain

Computer Security Briefly Support Your
Words: 2728 Length: 8 Document Type: Term Paper

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it

Architecture Modernism in Architecture Came
Words: 8020 Length: 25 Document Type: Dissertation

From approximately 1930 until the 1980s, rectangular and functional spaces were the chief form of architecture around the world in general. The latter part of the 20th century -- the 1980s onward -- saw change once again, however (2008). For the most part, 20th century architecture, however, "focused on machine aesthetics or functionality and failed to incorporate any ornamental accents in the structure" (2008). The designs were, for the

Computer Technology Assessing the Evolution
Words: 876 Length: 3 Document Type: Thesis

The real-time integration to memory management that would lead to rapid advanced in superscalar memory management made possible with RISC-based microprocessors and memory however continued to be driven by IBM and their partners working in conjunction with each other on new developments (Biswas, Carley, Simpson, Middha, Barua, 2006). Implications of RISC Development on Memory Management Advances Over the first twenty five years of RISC processor and memory development the key lessons

Computer Surveillance: Qualitative Attempt to
Words: 4976 Length: 19 Document Type: Term Paper

Studies suggest that even "more "omniscient" technology is likely to be developed" in the near future (Lyon, 2002). Cookies were perhaps the first form of internet surveillance, developed in 1994 as a means for websites to track visitors logging in so they could provide more optimal service (Lyon, 2002). Now cookies have transformed the shape of communication and have further advanced the ability of criminals to survey individual user functions

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now