What is the total execution time of the instruction sequence

Assignment Help Computer Engineering
Reference no: EM132324599

Assignment

Question 1:

Problems in this exercise refer to the following sequence of instructions:

LW $5, -16($5)

SW $5, -16($5) ADD $5, $5, $5

A) Indicate dependences and their type.

B) Assume there is not forwarding in this pipeline processor, indicate hazards and add NOP instructions to eliminate them.

C) Assume there is full forwarding, indicate hazards and add NOP instructions to eliminate unresolved cases.

The remaining problem in this exercise assumes the following clock cycle times:

Without forwarding With full forwarding With ALU-ALU forwarding only 200 ps 250 ps 220 ps

D) What is the total execution time of this instruction sequence without forwarding and with full forwarding? What is the speed-up achieved by adding full forwarding to a pipeline that had no forwarding?

E) What is the total execution time of this instruction sequence with only ALU-ALU forwarding? What is the speed-up over a no-forwarding pipeline?

Question 2:

For this problem, assume that all branches are resolved in ID stage and are perfectly predicted (this eliminates all control hazards). For the following fragment of MIPS code:

LW $5, -16($5)

SW $4, -16($4)

LW $3, -20($4)

BEQ $2, $0, Label ;Assume $2 ≠ $0 ADD $1, $5, $4

Label: SUB $2, $1, $3

If we only have one memory (for both instruction and data), there is a structural hazard every time we need to fetch an instruction in the same cycle in which another instruction accesses data. To guarantee forward progress, this hazard must always be resolved in favor of the instruction that accesses data.

A) What is the total execution time of this instruction sequence in the 5-stage pipeline that only has one memory?

B) How can the structural hazard be eliminated by adding NOP to the code? (Please show a modified version of the program with the added NOP instructions)

Question 3:

For following code, assume that the loop index ($10) is a multiple of 8:

Loop: LW $2, 0($10)

SUB $4, $2, $3

SW $4, 0($10)

LW $5, 4($10)

SUB $6, $5, $3

SW $6, 4($10)

ADDI $10, $10, 8

BNE $10, $30, Loop

Schedule this code (reorder the instructions and make any necessary changes) for fast execution on the 5- stage MIPS pipeline. Assume data forwarding and not-taken prediction of conditional branching.

Reference no: EM132324599

Questions Cloud

Achieve a set of goals for a given process capability : In the context of the CMMI, a "collection of related activities performed together to achieve a set of goals for a given process capability"
Describe four specific psychosocial factors : Describe four specific psychosocial factors that should be taken into account in order to understand the psychosocial context when working with the group you.
System for rapidly developing software : Extreme Programming is a system for rapidly developing software. One of the tenets of XP is that all code is written
Identify presenting problem for the case study you selected : Your presentation should address the following: Identify the presenting problem for the case study you selected. (Remember the presenting problem has to be.
What is the total execution time of the instruction sequence : CMSC411 Computer Architecture-University of Maryland Baltimore County-US-What is the total execution time of this instruction sequence without forwarding.
Identify exploits of common vulnerabilities : M7A1: Vulnerability Exploitation Assignment - Use industry tools to explore password guessing and/or cracking. Identify exploits of common vulnerabilities
Reimbursed for hcpcs code g0102 : Based on the NCCI policies, determine if the physician will be reimbursed for HCPCS code G0102
What are the three judicial powers of the president : According to the text, what are the three judicial powers of the president. Provide one example (form the text) of how a president have used one of these judici
Ethical and moral dilemmas in using peer-to-peer networks : What are the ethical and moral dilemmas in using peer-to-peer networks? Are they fundamentally right or wrong?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Recognize 3 to 5 technology or telecom standards

identify 3 to 5 technology or telecom standards organizations and the role they play in the industry. choose one

  Create a rock-paper-scissors application

Create a Rock-Paper-Scissors Application. Create a Class to contain the game data and any input or output methods.

  Write a recursive function that accepts two arguments

Write a recursive function that accepts two arguments into the parameters x and y.

  Question1 what are three goals of safety in computing for

question1. what are three goals of safety in computing? for each goal list two controls that be able to be implemented

  What method would implement that

But with my method, I can't see where a circular array fits. What method would implement that?

  What is the best data structure to store the students

What is the best data structure to store the students in a soccer team? Justify your answer.

  Explain why is the presence of a hardwired zero register so

question 1 why is the presence of a hardwired zero register so important in risc architectures?question 2 the mips isa

  Define a class for a type called countertype

Define a class for a type called CounterType. An object of this type is used to count things, so it records a count that is a nonnegative whole number.

  How to provide the name of the web site

For this project you will need to make a Microsoft Word document which includes a table and hyperlinks to Web sites helpful to someone studying in your major Paralegal.

  What is the time efficiency class of your algorithm

Design an algorithm that lists the teams in a sequence so that every team did not lose the game with the team listed immediately after it.

  Trade-offs between internal cohesion and external ties

Consider the different teams presented in your reading assignment. How do the teams manage their team boundaries? What are the trade-offs between internal.

  Give some of the major threats to information systems

What will happen if that information were compromised? What are some of the main threats to information systems? Provide three examples to support your answer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd