How consider the un-pipelined processor

Assignment Help Basic Computer Science
Reference no: EM13869518

Compose your work using a word processor (or other software as appropriate) and save it frequently to your computer. Be sure to check your work and correct any spelling or grammatical errors before you upload it.

Pipelining is used to increase throughput by overlapping instructions. Each instruction is represented by different segments. Each segment takes one machine cycle.

Consider the un-pipelined processor with the following parameters:

1 cycle is 1 nsec.

One instruction takes 3 cycles if it's an ALU operation, 4 cycles if it's a branch operation, and 5 cycles if it's a memory operation.

Assume the relative frequencies of these operations are 30%, 30%, 40%, respectively.

Find the average instruction execution time for this unpipelined processor.

Assuming a pipelined processor with a cycle of 1.3 nsec, which processor is faster and by how much? What is the speed up ratio?

Reference no: EM13869518

Questions Cloud

Therapy for the treatment of psychological disorders : Psychoanalysis is both a theory of personality and a therapy for the treatment of psychological disorders
Type of cement : What type of cement would you use in each of the following cases? Why?
Prepare the journal entries of roswall corporation : On January 1, 2010, Roswall Corporation's common stock is selling for $55 per share. On this date, Roswall creates a compensatory share option plan for its 60 key employees.
How can operating system keep track of which pages are clean : Assuming that each page has hardware bits to separately enable access for reading, writing, and execution, how can the operating system keep track of which pages are clean and which are dirty?
How consider the un-pipelined processor : Consider the un-pipelined processor
Prepare a schedule of the pierce company''s compensation : On January 1, 2010, Pierce Company establishes a performance based share option plan for its 80 top executives. The terms of the plan are that each executive is granted a maximum of 200 options after completing a threeyear service period.
Presentation that summarizes your practicum change project : Present Practicum Change Project- Create and post a PowerPoint presentation that summarizes your Practicum Change Project. In this Discussion, post the Practicum Change Project you developed
Discuss some possible algorithms for removing segments : Discuss some possible algorithms for removing segments in an unpaged, segmented memory. A program on the Core i7 references local segment 10 with offset 8000.
Find the transfer function : 1. Find the transfer function G(S) in terms of velocity v(t) and engine forward force f(t) for the Truck below. The cart mass is m. The truck mass is M. The damper Coefficient is b. The spring constant is k.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Database distribution strategy/simple database application

For this assignment, you will design and develop a distributed database infrastructure for an organization of your choice. You may use the database you created in another unit or you may choose to create a new database to work with for this assign..

  What role to assign to four workstations

What role (or roles) would you assign to each of the four workstations and any other equipment you recommend? What type of upgrades, if any, might the workstations require to make your solution work?

  Each letter of a three-letter word stored in memory

Write an LC3 program that "increments" each letter of a three-letter word stored in memory following the program. 'a' becomes 'd', 'n' becomes 'q', 'z' becomes 'c', etc. Make sure you comment your code! This is the Julius Caesar Cipher. Assume that a..

  Write an application that computes all of the amicable

The code should be written in Ruby and answers are displayed in the command prompt. Write an application that computes all of the amicable numbers less than the upper bound that is read in using a gets statement.

  Draft paper to cover the project scope

draft paper to cover the project scope document, an activity and milestone lists, WBS, cost baseline, schedule baseline, and a list of project stakeholders.

  Determine companies which specialize in computer forensics

What needs clarified? it's plainly stated use google to find 3 companies which specialize in computer forensics of those 3 companies write 2 or 3 paragraphs comparing what each company does.

  Write a program that asks the user for a year and computes

Write a program that asks the user for a year and computes whether that year is a leap year. I know how to build it, but I don't understand when it talks about the exceptions of 1582. Can someone explain this to me? Thanks.

  Use double variable to represent the private data of class

Use double variable to represent the private data of the class. Provide a constructor that enables an object of this class to be initialized when it is declared.

  Find the value in register a after the execution

Find the value in Register A after the execution of the following code, Which flag is used to see if the signed data are correctly added together

  Difference between mass surveillance and targeted surveillan

What is the difference between mass surveillance and targeted surveillance?

  What is the general solution to handle such game trees

The min max algorithm cannot handle some games (even-with alpha-beta pruning) because of the depth of the search trees involved. What is the general solution to handle such game trees?

  Emerging technologies developments

Are you a optimistic or apprehensive about developments in emerging technologies that simulate human experience? Provide examples of a business condition that would benefit from each of the following?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd