欢迎来到毕设资料网! | 帮助中心 毕设资料交流与分享平台
毕设资料网
全部分类
  • 毕业设计>
  • 毕业论文>
  • 外文翻译>
  • 课程设计>
  • 实习报告>
  • 相关资料>
  • ImageVerifierCode 换一换
    首页 毕设资料网 > 资源分类 > DOCX文档下载
    分享到微信 分享到微博 分享到QQ空间

    计算机专业毕业论文外文翻译--数据传送指令

    • 资源ID:129904       资源大小:29.13KB        全文页数:7页
    • 资源格式: DOCX        下载积分:100金币
    快捷下载 游客一键下载
    账号登录下载
    三方登录下载: QQ登录
    下载资源需要100金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

    计算机专业毕业论文外文翻译--数据传送指令

    1、毕业设计 1 外文资料 Data Transfer Techniques The actual transfer of data between the microcomputer and external and external devices is commonly carried out using three different techniques: ( 1) ling;( 2) errupters; (3)emory access;These techniques can be used individually or in combination. Polling Pollin

    2、g routines are used for programmed input/output purposes.A number of peripheral devices attached to the microcomouter are continuously polled at specified time intervals to determine the device wishes to input data to the microproccssor. Similarly, for the transfer of data to an output device,the st

    3、ate of its buffer is checked to determine if it is empty and ready to receive the data. A soft program is required to check the state of the peripheral devices. Hardware flaga are used to indacate the send or receive condition of the peripheral. If a device is ready to transfer the data, then an app

    4、ropriate software routine is used to service that particular device so that data transfer can take place .It is necessary to ensure that none of the data from any of the peripherals are lost while the polling routines or any the peripheral devices servicing routines are being executed. The probabili

    5、ty of loseing data is very small since most perpheral are slow deices. Other techniques, such as direct memory access(DMA) , can be used to achieve high-speed data transfer from a given peripheral. Polled input/output is very simple and common method of data transfer which does not require any addit

    6、ional logic circuitry.The only requirement is for an efficient program which is executed at very high speed. Interrupted Intput/output The polling procedure is a form of time-sharing whereby the facilities of the computer are shared between a numbers of uses. The computer continually polls each of t

    7、he terminals, and serves a terminal for a specified period of time before moving on to the next one. This procedure is inefficient because system overheads are incurred in polling all the perpheral devices irrespective of the actual need. The time available for the processing of the real-time requir

    8、ements of process control system in which a particular device might require urgent attention while the processor is servicing another input/output device. In some circumstances the actual data might be lost. These difficulties can be overcome by using the hardware interrupt input/output system. The

    9、output of the microcomputer system can be increased substantially by using such interrupts, since an input/output device is serviced only after it indicates that it is ready to send or receive data.This request for input/output can occur at any time, i.e. in an asynchronous mode,and the devices indi

    10、cates this by seting up an interrupt flag. The microprocessor acknowledges the interrupt, completes the execution of the current 毕业设计 2 instruction, saves the content of the registers and then servieces the requesting devices by transferring control to an appropriate intput/output routine. Once the

    11、peripheral device has been serviced, the control is transferred back to the original program which resumes execution from the point at which it was interrupted. Some real-time control applications involve the use of critical programs which must not be interrupted during their execution. Some of the

    12、interrupted are trivial which others have to be serviced. For example, data input can be delayed which alarms muse be raised immediately.Differernt types of interrupts, maskable and non-maskable,can be used to overcome these difficulties. Software programs are used to enable or disable a maskable in

    13、terrupt. Thus,if the maskable interrupt. Thus, if the maskable interrupt has been disabled,the microprocessor will ignore the interrupt request. A non-maskable interrupt has to be acknowdged and serviced by the microprocessor. The interrupt used in a microprocessor system might be a fixed interrupt

    14、or a vectored interrupt. A fixed interrupt requires relatively simple hardware. The flag is set on the interrupt line to indicate that service is required. If there is only one device attached to interrupt line ,then the control will be transferred to a fixed memory location which provide the progra

    15、m for servicing that device. When a number of of devices are attached to a given interrupt line, each with its own servicing routine, then the peripheral responsible for the interrupt has to be identifed. Thus a polling routine examination must be used to detect the peripheral requiring service and

    16、then determine the memory location at which the program for servicing that device starts. Multiple interrupt lines can be used tovercome these difficulties. Interrupts with multiple lines provide the addresses of different memory locations to which the program should transfer in response to an inter

    17、rupt on a particular It would be necessary to use as many lines as the number of interrupts or resort to polling routines if more than one device is attached to the same interrupts line . A preferred alternative is to use a vectored interrupt whereby the interrupting device is directly identifed .Th

    18、is device identification can be used to to look up the starting memory location of the service routine for that device. Some vectored interrupts not only identify the interrupting device,butalse provide the starting memory location of the service routine to which the program should jump.Thus the add

    19、ress of the memory location, stored in the peripheral controller ,is placed on the data bus and used for transfering the controller. A system with only one device which can interrupt the normal work of the microcomputer is a very simple one and the particular interrupt can be readily serviced. In pr

    20、actice a large number of devices can provide interrupt requests to the microcomputer .Under normal circumstances, it is likely that two or more devices may provide an interrupt request at the same time.It then becomes necessary 毕业设计 3 to decide the priority to be allocated to individual interrupt re

    21、quest .A number of procedures can be used for priority allocation purposes. Priorities can be allocated to peripherals attached to a single interrupt line by using a simple daisy chain procedure. Once interrupt, the microcomputer sends a signal to the first device in the daisy If it is the interrupt

    22、ing device ,then it will provide the memory address of its service routine and the signal will not be passed on to the other way round devices in the daisy chain. If, however ,the first device did not cause the interrupt,then the massage will be passed on to the next device. This procedures is repea

    23、ted until the interrupting device is located. Clearly the first floor device in the daisy chain will have highest priority ,followed by the next one and so on. Once an interrupt request has been acknowledge and is being serviced all the other interrupt either have to be disable or higher priority in

    24、terrupts must be allowed to break into the current service routine . An alternative to daisy chains is to use priority interrupt circuits which identify and service the device with highest priority. Level 0 means highest priority,followed by level 1, level 2 and so on. These priority interrupt circu

    25、its identify up to 8 interrupt level by means of a 3-bit code which can be inspected by the microprocessor.Since event such as power failure must be identified quickly and alarms must be raised as soon as possible, these sub-systems are attached to higher priority interrupts. Similarly, other periph

    26、erals requiring fast response can be alloacted higher priority than slow-speed peripherals. Facilities exist for the programmer to mask selectively one or more interrupt levels. When an interrupt is being serviced and another interrupt tasks place, then the priority of the new interrupt is compared

    27、with the priority of the existing interrupt. A higher priority interrupt is allowed to suspend the servicing of the current interrupt, otherwise the lower priority interrupt will until the higher priority one has serviced. Some of the currently available priority interrupt circuits carry out far mor

    28、e than the identification of the highest priority device which requires attention. Then will also provide the address of the memory location to which the control should be transferred. If two interrupts occur simultaneously, the device serviced by the microcessor program has the higher priority. Dir

    29、ect Memory Access While interrupted input/output throughput rate is higher than the throughput applications requiring fast data transfering. Direct memory access (DMA) techniques bypass the central processing unit and substantially increase the data transfer rate which can be as high as the memory c

    30、ycle time allows. The other limiting factor is the speed of the peripheral device. This technique can be used to write data required at high speeds or for transfers between the memory and the mass storage devices attached to the microcomputer. DMA involves the isolation of all devices, other than the single device to be used to for data transfers, from the memory which the data trantsfer between the memory and


    注意事项

    本文(计算机专业毕业论文外文翻译--数据传送指令)为本站会员(泛舟)主动上传,毕设资料网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请联系网站客服QQ:540560583,我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们
    本站所有资料均属于原创者所有,仅提供参考和学习交流之用,请勿用做其他用途,转载必究!如有侵犯您的权利请联系本站,一经查实我们会立即删除相关内容!
    copyright@ 2008-2025 毕设资料网所有
    联系QQ:540560583