+61-413 786 465

info@mywordsolution.com

## Computer Science

 Algorithms Design Computer Network & Security Automata & Computation Operating System Computer Architecture Information Technology Internet Programming Software Engineering Data Communication Computer Graphics Compiler Design LINUX/UNIX Data Structure WINDOWS Application Digital Circuit E-Commerce Microprocessor Artificial Intelligence Data Warehouse Cryptography

Consider a sequence of instructions, where the syntax consists of an opcode followed by the destination register, followed by one or two source registers.
2 AND R7, R5, 3
4 SRL R7, R0, 8
5 OR R2, R4, R7
6 SUB R5, R3, R4
9 SUB R2, R1, R6
10 AND R3,R7,15

Assume the use of a four-stage pipeline: fetch, decode/issue, execute, and prepare back. Assume that all pipeline stages take one clock cycle except the execute stage. For simple integer arithmetic and logical instructions, the execute stage takes one cycle, but for LOAD from memory, five cycles are consumed in the execute stage. If we have a simple scalar pipeline, but allow out-of-order execution, we can construct a table showing for the execution of the first seven instructions.

Instruction Fetch Decode Execute prepare back
0 0 1 2 3
1 1 2 4 9
2 2 3 5 6
3 3 4 10 11
4 4 5 6 7
5 5 6 8 10
6 6 7 9 12

The entries under the four pipeline stages indicate the clock cycle at which each instruction begins each phase. In this program , the second ADD instruction (instruction 3) depends on the load (instruction 1) for one of its operands, r6. Because the LOAD instruction takes five clock cycles, and the issue logic encounters the dependent ADD instruction after two clocks, the issue logic must delay the ADD instruction for three clock cycles. With an out of order capability, the processor can stall instruction 3 at clock cycle 4, and then move on to issue the following three independent instructions, which enter execution at clocks 6, 8, and 9. The LOAD finishes execution at clock 9, and so the dependent ADD can be launched into execution on clock 10.

a) Complete the preceding table

b) Redo the table, assuming no out-of-order capability. What is the savings using the capability?

c) Redo the table assuming a superscalar implementation that can handle two instructions at a time at each stage.

Computer Network & Security, Computer Science

• Category:- Computer Network & Security
• Reference No.:- M998663

Have any Question?

## Related Questions in Computer Network & Security

### In a short paragraph explain the transmission of data for a

In a short paragraph, explain the transmission of data for a TCP connection between a client computer and a web server to request a web page. Assume that the server responds with a web page that fits in one packet. Assum ...

### Question suppose you work in a network security company and

Question: Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have ...

### 1 a firms marginal rate of technical substitution at m p lm

1) A firm's marginal rate of technical substitution at M P L/M P = 3, and the ratio of prices of labor and capital ,w/r, is 4. a) Is the firm minimizing its cost? Why or Why not? b) What can it do to improve its situatio ...

### Wireless networks and security assignment - design and

Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network Purpose of the assessment - The purpose of this assignment is to design and implement a secure enterprise wirele ...

### You just signed a 30-year lease agreement for a business

You just signed a 30-year lease agreement for a business property. The monthly rent for the first year is \$1,000/month, with the ?rst month's rent due today. Starting from the second year onward, the monthly rent will be ...

### Objectivespart 1 researching network attacks- research

Objectives Part 1: Researching Network Attacks - Research network attacks that have occurred. - Select a network attack and develop a report for presentation to the class. Part 2: Researching Network Security Audit Tools ...

### Americans purchase a lot of coffee grown in brazil and

Americans purchase a lot of coffee grown in Brazil and elsewhere in Latin America. It would seem that in order to avoid the huge transportation costs of bringing coffee here and to provide jobs for Americans, we should g ...

Assignment : Wireless Applications, Advances, Advantages, and Disadvantages The adoption of wireless technologies varies from one industry to another, and is often based on the benefits provided versus the challenges, im ...

### Assessment - network analysis using wiresharkpurpose of the

Assessment - Network Analysis using Wireshark Purpose of the assessment (with ULO Mapping) This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the comple ...

### The software company niksoft is selling a new defense

The software company NikSoft is selling a new defense against DDoS attacks. Their software looks at the source IP address on all incoming packets, and if it finds any IP address that accounts for more than 1% of traffic ...

• 13,132 Experts

## Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

### Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

### Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

### Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of \$ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

### Compute the present value of an 1150 payment made in ten

Compute the present value of an \$1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

### Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of \$ 699 per year for 19 years, given a discount rate of 6 percent per annum. As