Verified Document

Computer System Architecture Research Paper

Evolution of System Performance: RISC, pipelining, cache memory, virtual memory

Historically, improvements in computer system performance have encompassed two distinct factors: improvements in speed and also improvements in the number of applications which can be run by the system. Of course, the two are interlinked given that high levels of speed are linked to expansions of short-term memory and the ability of computers to use that memory to perform critical functions. One notable early improvement in computer functionality was the development of RISC. RISC is an acronym for Reduced Instruction Set Computer. RISC is characterized by several distinct features, most notably pipelining which is "a technique that allows for simultaneous execution of parts, or stages, of instructions to more efficiently process instructions" and a larger number of registers which allows for the use of more generalized terms to process a wider variety of applications, versus the more specialized ones characteristic of other types of architectures (Chen, Novick & Shimano 2000, What is RISC). Simultaneous execution notably expanded the complexity of applications computers were able to perform. The first RISC processor using pipelining was developed at Stanford University during the early 80s along with...

The "MIPS processor implemented a smaller, simpler instruction set. Each of the instructions included in the chip design ran in a single clock cycle" (Chen, Novick & Shimano 2000, MOSC).
The history of cache memory also dates back to the 1980s. Before the development of cache memory, all computer memory was slow and expensive, which severely limited its utility on a practical basis. However, the ability of CPU caches to store small amounts of needed short-term memory notably speeded up systems, combined with the development of microprocessors at the same time (Hruska 2014: 1). "The goal of the cache system is to ensure that the CPU has the next bit of data it will need already loaded into cache by the time it goes looking for it" (Hruska 2014:1). The use of memory cache means that the programs and data the computer uses most frequently is easily accessible and thus speeds up access. "By keeping as much of this information as possible in SRAM, the computer avoids accessing the slower DRAM, which makes the computer faster" ("Cache," 2015).

The improvement of virtual memory has been another important asset to computer functioning and utility. When a computer does not have…

Cite this Document:
Copy Bibliography Citation

Related Documents

Payroll System Architecture for a Large Company
Words: 2315 Length: 8 Document Type: Essay

New Payroll Application Architecture One of the most commonly automated business processes and operations in the recent past is payroll, which is also the most often used human resource solution. The increased use and automation of payroll is attributable to the need to ease and reduce the time spent in payroll processes, which is one of the first applications in the working environment. Despite the increased automation of payroll, there are

Architecture Modernism in Architecture Came
Words: 8020 Length: 25 Document Type: Dissertation

From approximately 1930 until the 1980s, rectangular and functional spaces were the chief form of architecture around the world in general. The latter part of the 20th century -- the 1980s onward -- saw change once again, however (2008). For the most part, 20th century architecture, however, "focused on machine aesthetics or functionality and failed to incorporate any ornamental accents in the structure" (2008). The designs were, for the

Computer Science Fundamentals Too Often the Mechanistic
Words: 1481 Length: 5 Document Type: Essay

Computer Science Fundamentals Too often the mechanistic are taken for granted in computer science. The technology has been around long enough now, that many take for granted the great powers that computers and computing technology has afforded modern man and his society. The fundamental characteristics of any successful endeavor should be investigated to help identify a pattern and produce learning and gather information. The purpose of this essay is identify and explain

Computer Security Briefly Support Your
Words: 2728 Length: 8 Document Type: Term Paper

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it

System Development Life Cycle SDLC
Words: 1611 Length: 5 Document Type: Term Paper

However, the company did feel it should develop its own Database infrastructure that would work with the new underlying database management system and would mesh with existing organizational skills and the selected enterprise software solution. Because the company followed a standardized implementation process, they were able to successfully reengineer their existing business structure. The objective of the System Development Life Cycle is to help organizations define what an appropriate system

System Development Life Cycle
Words: 2836 Length: 10 Document Type: Term Paper

system development life cycle (SDLC) approach to the development of Information Systems and/or software is provided. An explanation of SDLC is offered, with different models applied in implementing SDLC delineated. Advantages and disadvantages associated with each of the models will be identified. System Development Life Cycle According to Walsham (1993), system development life cycle (SDLC) is an approach to developing an information system or software product that is characterized by a

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now