Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1: Detail for each of the four following MIPS instructions, which actions are being taken at each of their five steps.  Do not forget to mention how and during which steps each instruction updates the program counter.

a) jalr $s0, $s1
b) sw $s1, 24($t0)
c) slt $t0, $s3, $s4
d) jal 1048576

problem 2: Consider these two potential additions to the MIPS instruction set and describe how they would restrict pipelining.

a) cp d1(r1), d2(r2)

copy contents of word at address c address contents of r2 plus offset d2 into address contents of r1 plus displacement d2.

b) incr d2(r2)

adds one to the contents of word at address contents of r2 plus offset d2.

problem 3: describe how you would pipeline the four following pairs of statements.

a) add $t0, $s0, $s1
beq $s1,$s2, 300

b) add $t2, $t0, $t1
sw $t3, 36($t2)

c) add $t0, $s0, $s1
beq $t0,$s2, 300

d) lw $t0, 24($t1)
sub $s2, $t0, $t1

problem 4: A computer system has a two-level memory cache hierarchy. The L1 cache has a zero hit penalty, a miss penalty of 5 ns and a hit rate of 95 percent. The L2 cache has a miss penalty of 100 ns and a hit rate of 90 percent.

a) How many cycles are lost for each instruction accessing the memory if the CPU clock rate is 2 GHz?

b) We can either increase the hit rate of the topmost cache to 98 percent or increase the hit rate of the second cache to 95 percent. Which improvement would have more impact?

problem 5: A virtual memory system has a virtual address space of 4 Gigabytes and a page size of 8 Kilobytes. Each page table entry occupies 4 bytes.

a) How many bits remain unchanged during the address translation?

b) How many bits are used for the page number?

c) What is the maximum number of page table entries in a page table?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91288

Have any Question? 

Related Questions in Computer Engineering

1 why are vulnerabilities difficult to predict2 discuss the

1. Why are vulnerabilities difficult to predict? 2. Discuss the sources of system vulnerabilities. 3. Is it possible to locate all vulnerabilities in a network? In other words, can one make an authoritative list of those ...

Internethas the internet contributed to plagiarism has it

Internet Has the Internet contributed to plagiarism? Has it made it easier to plagiarize? Do individuals that place original content have right to be acknowledged or is it too much of a hindrance? Write 3-4 pages A. Rese ...

1 for an undirected network of n vertices stored in

1. For an undirected network of n vertices stored in adjacency list format show that: a) It takes time 0 (n (n + m)) to find the diameter of the network. b) It takes time O( (k)) on average to list the neighbors of a ver ...

1 for a system without a dmz where is the best area in the

1. For a system without a DMZ, where is the best area in the network to install a honeypot? 2. Why are honeypots important to a network? Discuss the disadvantages of having a honeypot in the network. 3. Discuss three app ...

Implement the bankers algorithm- needed before the end of

Implement the Banker's algorithm- needed before the end of today Implement the Banker's algorithm for deadlock avoidance, that works on a given set of N processes and M resource types (N The input data and result is then ...

Assignmentscenario the newest gaming computer costs 5000

Assignment Scenario: The newest gaming computer costs $5000 for a 31-inch screen, two 1TB hard drive, a metallic case, and a blazing fast processor. Ten years ago, your grandmother gave you $2500. The money has been in a ...

Repeat problem p4-3 for the differential manchester

Repeat Problem P4-3 for the differential Manchester scheme. Prob. 4.3 Draw the graph of the NRZ-L scheme using each of the following data streams, assuming that the last signal level has been positive. From the graphs, g ...

1 implement the function treesizeroot which computes the

1. Implement the function treeSize(root), which computes the number of nodes in a binary tree. 2. Implement the function treeHeight(root), which computes the height of a binary tree. 3. Implement the computeOp(lvalue, op ...

1 list the possible values of c and d for an implementation

1. List the possible values of C and D for an implementation that ensures both consistency assumptions on page 470. 2. List at least one more possible pair of values for C and D if such assumptions are not maintained. 3. ...

Add a time deposit account class to the bank account

Add a Time Deposit Account class to the bank account hierarchy. The time deposit account is just like a savings account, but you promise to leave the money in the account for a particular number of months, and there is a ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen