Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: Detail for each of the four following MIPS instructions, which actions are being taken at each of their five steps.  Do not forget to mention how and during which steps each instruction updates the program counter.

a) jalr $s0, $s1
b) sw $s1, 24($t0)
c) slt $t0, $s3, $s4
d) jal 1048576

problem 2: Consider these two potential additions to the MIPS instruction set and describe how they would restrict pipelining.

a) cp d1(r1), d2(r2)

copy contents of word at address c address contents of r2 plus offset d2 into address contents of r1 plus displacement d2.

b) incr d2(r2)

adds one to the contents of word at address contents of r2 plus offset d2.

problem 3: describe how you would pipeline the four following pairs of statements.

a) add $t0, $s0, $s1
beq $s1,$s2, 300

b) add $t2, $t0, $t1
sw $t3, 36($t2)

c) add $t0, $s0, $s1
beq $t0,$s2, 300

d) lw $t0, 24($t1)
sub $s2, $t0, $t1

problem 4: A computer system has a two-level memory cache hierarchy. The L1 cache has a zero hit penalty, a miss penalty of 5 ns and a hit rate of 95 percent. The L2 cache has a miss penalty of 100 ns and a hit rate of 90 percent.

a) How many cycles are lost for each instruction accessing the memory if the CPU clock rate is 2 GHz?

b) We can either increase the hit rate of the topmost cache to 98 percent or increase the hit rate of the second cache to 95 percent. Which improvement would have more impact?

problem 5: A virtual memory system has a virtual address space of 4 Gigabytes and a page size of 8 Kilobytes. Each page table entry occupies 4 bytes.

a) How many bits remain unchanged during the address translation?

b) How many bits are used for the page number?

c) What is the maximum number of page table entries in a page table?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91288

Have any Question? 


Related Questions in Computer Engineering

Part 1find a recent article or video describing the

Part 1 Find a recent article or video describing the competition between two or more businesses. And describe in 2-5 sentences on the following: 1 The competing businesses and they sell 2 Which company you believe is win ...

Develop an algorithm fora an m x m median filter andb an m

Develop an algorithm for (a) an M x M median filter, and (b) an M x 1 separable median filter that minimizes the number of operations required for filtering N x N images, where N >> M. Compare the operation counts for M ...

1 what is pki why is it so important in information

1. What is PKI? Why is it so important in information security? 2. What is the difference between authentication and nonrepudiation? 3. Why is there a dispute between digital nonrepudiation and legal nonrepudiation?

Discussionthe benefits of microsoft officebullidentify at

Discussion "The Benefits of Microsoft Office" • Identify at least two ways that a user can combine content from two or more Office applications. Explain the major benefits of doing so for each identified example. • Descr ...

Create a foreign agent advertisement message using 1672 as

Create a foreign agent advertisement message using 1672 as the sequence number and a lifetime of 4 hours. Select your own values for the bits in the code field. Use at least three care-of addresses of your choice. Calcul ...

1 for an undirected network of n vertices stored in

1. For an undirected network of n vertices stored in adjacency list format show that: a) It takes time 0 (n (n + m)) to find the diameter of the network. b) It takes time O( (k)) on average to list the neighbors of a ver ...

Would you recommend using the routing table that has a

Would you recommend using the routing table that has a default route or hasn't? Please explain the advantage and disadvantages.

1 if one-time pads are provably secure why are they so

1. If one-time pads are provably secure, why are they so rarely used in practice? 2. Prove that the DES key consisting of all 0-bits and the DES key consisting of all 1-bits are both weak keys. What are the other two wea ...

1 distinguish between multicasting and multiple unicasting2

1. Distinguish between multicasting and multiple unicasting. 2. When we send an e-mail to multiple recipients, are we are using multicasting or multiple unicasting? Give the reason for your answer. 3. Define which of the ...

Employees at your company are watching youtube videos

Employees at your company are watching YouTube videos constantly while using their office computers. The YouTube Web site sends compressed video through the Internet and company network to employees' computers, and the v ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro