Iteration take in a single-cycle datapath

Assignment Help Business Management
Reference no: EM132294664

1. Consider the following code sequence: loop: add $t0, $t1, $t2

lw $t3, 10($t0)

lw $t4, 14($t0)

sub $t5, $t4, $t3

sw $t5, 18($t0)

addi $t2, $t2, 4

slti $t6, $t2, 200

bne $t6, $zero, loop

Assume that each datapath stage requires the following minimum amount of time to complete:

  • Instruction fetch (IF): 30 ns
  • Instruction decode (ID): 20 ns
  • Execute / address calculation (EX): 25 ns
  • Memory access (MEM): 30 ns
  • Register write back (WB): 20 ns

a. How long will one loop iteration take in a single-cycle datapath?

b. How long will one loop iteration take in a multi-cycle datapath?

c. If we assume ideal pipelining (i.e., no hazards and therefore no stalls), how long will one loop iteration take in a pipelined datapath? What is the speedup over the single-cycle and multi-cycle datapaths?

d. If we now assume a more realistic pipelined datapath without forwarding, how long will one loop iteration take? Show a revised code sequence that includes all necessary no-ops to support your answer.

e. Which of the data hazards in this code can be completely resolved using forwarding? For each hazard, list the register number and the two instructions involved.

Reference no: EM132294664

Questions Cloud

Discuss the pros and cons of hardware based virtualization : Why might virtualization be a great model for a public library or a testing center like Prometric? Support your response with examples and information from the
How many ones would be in the network mask : Suppose a network administrator wants to place 64 subnets on a /19 network. 1) How many ones would be in the network mask?
Please discuss any algorithm related to cryptography : Please discuss any algorithm related to cryptography (encryption and/or decryption) with an example (do not use same example used by your peers).
Evaluating the security of the system : CO4509 - Computer Security - University of Central Lancashire - Develop new web-based store. Benny Vandergast Inc has provided a VMware virtual machine
Iteration take in a single-cycle datapath : 1. Consider the following code sequence: loop: add $t0, $t1, $t2
Formulate the problem of deciding : Derive from Hall's theorem on this bipartite graph H a necessary and sufficient condition for the existence of an orientation of G satisfying the indegree
Call the add function and multiply function : Is there any help for a Python program which contains three functions:
List and explain in detail the two different hci : Can you pls give me a guide or direction on how to answer these questions? 1. List and explain in detail the two different HCI methods of usability inspections
Detail explanation of this incremental mining : Please provide a detail explanation of this incremental mining:

Reviews

Write a Review

Business Management Questions & Answers

  Best described as surplus management

Why asset/liability management is best described as surplus management?

  Managed care and leadershipmanaged care seeks to provide

managed care and leadershipmanaged care seeks to provide the right care at the right time in the right amount. how

  What tenets of the auburn creed would be attractive

What tenets of the Auburn Creed would be attractive characteristics for skills that a company would need in the future and which tenets are not current?

  Marketing plan to instructor for review and feedback

Submit an outline of your marketing plan to instructor for review and feedback. Be sure to include the following in your plan:

  Discuss the term host as it applies to devices connected

When you use a laptop to connect to the Internet, is it a host? Why or why not. When you use the Internet, are you a host? Why or why not?

  Discussion of twentieth century communication developments

A brief discussion of twentieth century communication developments, milestones, and applications exemplifying changes in media portrayal of sex and violence.

  Determining the productivity recommendations

Last week, you familiarized yourself with the Physician Care Services, Inc. case and selected metrics that would help you to evaluate the organization's productivity, with an eye to determining whether they could be successful in the current envi..

  Enterprising managers of the future

The audience for the Briefing is the Senior Management team of a large global company, who are looking for ways to develop the young ‘enterprising managers of the future' in their organisation.

  Professional story related to supportive context

Share a personal or professional story related to SUPPORTIVE CONTEXT. Demonstrate that you have really read, understood

  What is loss leader pricing and what are unfair sales acts

Explain how unethical marketers might use bait-andswitch tactics, price-fixing, and predatory pricing. What is loss-leader pricing? What are unfair sales acts?

  Characteristic of competitive markets

A characteristic of competitive markets (perfect competition), as well as monopolistic competition is the absence of entry and exit barriers. This means that new firms can easily enter the market, and it is also easy to exit the market. Firms woul..

  What methods are most popular ones in your area of research

What methods are the most popular ones in your area of research? In your view, what are the pros and cons of using quantitative methods?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd