Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1: Detail for each of the four following MIPS instructions, which actions are being taken at each of their five steps.  Do not forget to mention how and during which steps each instruction updates the program counter.

a) jalr $s0, $s1
b) sw $s1, 24($t0)
c) slt $t0, $s3, $s4
d) jal 1048576

problem 2: Consider these two potential additions to the MIPS instruction set and describe how they would restrict pipelining.

a) cp d1(r1), d2(r2)

copy contents of word at address c address contents of r2 plus offset d2 into address contents of r1 plus displacement d2.

b) incr d2(r2)

adds one to the contents of word at address contents of r2 plus offset d2.

problem 3: describe how you would pipeline the four following pairs of statements.

a) add $t0, $s0, $s1
beq $s1,$s2, 300

b) add $t2, $t0, $t1
sw $t3, 36($t2)

c) add $t0, $s0, $s1
beq $t0,$s2, 300

d) lw $t0, 24($t1)
sub $s2, $t0, $t1

problem 4: A computer system has a two-level memory cache hierarchy. The L1 cache has a zero hit penalty, a miss penalty of 5 ns and a hit rate of 95 percent. The L2 cache has a miss penalty of 100 ns and a hit rate of 90 percent.

a) How many cycles are lost for each instruction accessing the memory if the CPU clock rate is 2 GHz?

b) We can either increase the hit rate of the topmost cache to 98 percent or increase the hit rate of the second cache to 95 percent. Which improvement would have more impact?

problem 5: A virtual memory system has a virtual address space of 4 Gigabytes and a page size of 8 Kilobytes. Each page table entry occupies 4 bytes.

a) How many bits remain unchanged during the address translation?

b) How many bits are used for the page number?

c) What is the maximum number of page table entries in a page table?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91288

Have any Question? 

Related Questions in Computer Engineering

1 why was vbscript not very popular2 the biggest script

1. Why was VBScript not very popular? 2. The biggest script security threat has always been the acceptance of untrusted data. What is the best way for scripts to accept data and preserve the trust?

Although most systems allow objects to have only one owner

Although most systems allow objects to have only one owner, it is possible for an object to have two (or more) owners. Consider ownership as a right that allows the changing of capabilities (or access control lists). How ...

Timnbspurban ownermanager ofnbspurbans motor court in

Tim Urban, owner/manager of Urban's Motor Court in Key West, is considering outsourcing the daily room cleanup for his motel to Duffy's Maid Service. Tim rents an average of 50 rooms for each of 365 nights (365 × 50 equa ...

Write methodsthat compute the angle between the x-axis and

Write methods that compute the angle between the x-axis and the line joining two points, measured in degrees, and the slope of that line. Add the methods to the class Geometry. Supply suitable preconditions. Why does it ...

Assignmentselect a task that a program could perform over

Assignment Select a task that a program could perform over an array of items that would be used by a small business. Your task must include the following: • Declaring array • Populating the array • Processing the items i ...

Now we want to extend the affine cipher from sect 144 such

Now, we want to extend the affine cipher from Sect. 1.4.4 such that we can encrypt and decrypt messages written with the full German alphabet. The German alphabet consists of the English one together with the three umlau ...

Write a gui application for the webbuy company that allows

Write a GUI application for the WebBuy Company that allows a user to compose the three parts of a complete email message: the "To:", "Subject:" and "Message:" text. The "To:", and "Subject:" Text areas should provide a s ...

Question 1 an example of the neuron model is the sigmoid

Question 1. An example of the neuron model is the sigmoid function which is defined by: φ(v)=1/(1+exp?(-v)) For this problem, you need to prove that (∂φ(v))/∂v=φ(v)(1-φ(v)) Question 2. Consider the following cost functio ...

Since may 26 2002 the aes advanced encryption standard

Since May 26, 2002, the AES (Advanced Encryption Standard) describes the official standard of the US government. 1. The evolutionary history of AES differs from that of DES. Briefly describe the differences of the AES hi ...

In computer science when we encounter an algorithm we often

In computer science, when we encounter an algorithm, we often need to ask about the complexity of that algorithm (how many computations we need to do). To find the complexity of Dijkstra's algorithm, find the number of s ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro