'Why are there all these different processor architectures and what do they all mean? Which processor will I use? How should I choose it?' Given the task of selecting an architecture or design approach, both engineers and managers require a knowledge of the whole system and an explanation of the design tradeoffs and their effects. This is information that rarely appears in data sheets or user manuals. This book fills that knowledge gap. Section 1 provides a primer and history of the three basic microprocessor architectures. Section 2 describes the ways in which the architectures react with the system. Section 3 looks at some more commercial aspects such as semiconductor technology, the design cycle, and selection criteria. The appendices provide benchmarking data and binary compatibility standards. Since the first edition of this book was published, much has happened within the industry. The Power PC architecture has appeared and RISC has become a more significant challenger to CISC. The book now includes new material on Power PC, and a complete chapter devoted to understanding the RISC challenge. The examples used in the text have been based on Motorola microprocessor families, but the system considerations are also applicable to other processors. For this reason comparisons to other designs have been included, and an overview of other processors including the Intel 80x86 and Pentium, DEC Alpha, SUN Sparc, and MIPS range has been given. Steve Heath has been involved in the design and development of microprocessor based systems since 1982. These designs have included VMEbus systems, microcontrollers, IBM PCs, Apple Macintoshes, and both CISC and RISC based multiprocessor systems, while using operating systems as varied as MS-DOS, UNIX, Macintosh OS and real time kernels. An avid user of computer systems, he has written numerous articles and papers for the electronics press, as well as books from Butterworth-Heinemann including VMEbus: A Practical Companion; PowerPC: A Practical Companion; MAC User's Pocket Book; UNIX Pocket Book; Upgrading Your PC Pocket Book; Upgrading Your MAC Pocket Book; and Effective PC Networking.6C level 3 outovector l B OO10 Illegol instruction 4 70 Level 4 outovector lC OO14 Divide-by-zero 5 74 Level 5 outovector ... 8 80 2O OO24 Troce Q 16 TRAP Instructions 0O28 Line 1010 emulatof A OO2C Line l l l l Emulator B CO 30 C Unassigned ... The next location is used for any attempt to execute an illegal instruction.
|Publisher||:||Elsevier - 2014-06-28|