Explain optimization process of pipelining, Computer Engineering

Assignment Help:

Q. Explain Optimization process of Pipelining ?

RISC machines can use a very efficient pipeline scheme due to the regular and simple instructions. Similarly all other instruction pipelines RISC pipeline suffer from problems of branching instructions anddata dependencies. RISC optimizes this problem by employing a technique known as delayed branching. 

One of the common schemes used to avoid branch penalty is to pre-fetch branch destination also. RISC follows a branch optimization scheme known as delayed jump as displayed in the illustration given below:

1184_Explain Optimization process of Pipelining.png

(a)   The instruction "If RD< 0 Return" may cause pipeline to empty

904_Explain Optimization process of Pipelining1.png

(b) The No operation instruction causes decision of the If instruction known, thus correct instruction can be fetched.


Related Discussions:- Explain optimization process of pipelining

Name the switching schemes used in a digital exchange, Name the switching s...

Name the switching schemes used in a digital exchange? The several switching systems used are:  1. Strowger Switching System 2. Cross bar Switching. 3. Electronic Swit

Explain the programmable rom (prom) - computer memory, Explain the Programm...

Explain the Programmable ROM (PROM) - Computer Memory? This is a kind of ROM that can be programmed using special equipment it can be written to, but only once and this is usef

Explain redundant array of independent disks levels, Q. Explain Redundant A...

Q. Explain Redundant Array of Independent Disks levels? One such industrial standard that exists for multiple-disk database schemes is called as RAID which implies Redundant Ar

Constants - first-order logic, Constants - first-order logic: Constant...

Constants - first-order logic: Constants are things that is cannot be changed, like as england, black and barbara. So then they stand for one thing only, so that can be confu

Explain protection mechanism, Explain Protection mechanism. Protection...

Explain Protection mechanism. Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a) Access controls list

How deep does fifo require to be stop underflow or overflow, Given the subs...

Given the subsequent FIFO and rules, how deep does the FIFO require to be to stop underflow or overflow? RULES: a. frequency(clk_A) = frequency(clk_B) / 4 b. per

What are single stage and multistage networks, What are single stage and mu...

What are single stage and multistage networks? Compare the strengths and weaknesses of each. OR List the major difference in single stage, two stages and three stage Netw

Users to run programs at same time, A computer system that allows multiple ...

A computer system that allows multiple users to run programs at similar time   Multi tasking system

What is a lambda expression, A Lambda expression is not anything but an Ano...

A Lambda expression is not anything but an Anonymous Function, can have expressions and statements. Lambda expressions can be used mostly to make delegates or expression tree types

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd