Explain the classification according to level of processing, Computer Networking

Assignment Help:

Classification according to level of processing

According to this categorization computer operations are classified like arithmetic operations and instruction execution. Subsequently we discuss below classes of this categorizations:

  • Instruction Pipeline: We know that an instruction cycle can comprise several operations such as decode opcode, fetch opcode, compute operand addresses, execute instructions, and fetch operands. These operations of instruction execution cycle may be realized by pipelining concept. Every of these operations represent one stage/phase of a pipeline. The overlapping of execution of operations via the pipeline offers a speedup over normal execution. So the pipelines used for instruction cycle operations are called instruction pipelines.
  • Arithmetic Pipeline: The complex arithmetic operation such as floating point and multiplication operations takes much of the time of ALU. These operations can too be pipelined by sectioning the operations of ALU and as a result high speed performance can be achieved. So the pipelines used for arithmetic functions are called as arithmetic pipelines.

 


Related Discussions:- Explain the classification according to level of processing

Describe in details about applications of computer networks, Describe in de...

Describe in details about applications of Computer Networks ?

Tools that an attacker can use to crack wep, Question: Consider that yo...

Question: Consider that you have to configure a small WLAN of 8 computers using Wired Equivalent Privacy (WEP) and that you have to best make use of its available security f

Inductor, #clasification of inductor

#clasification of inductor

Troubleshooting vtp configuration -ccna, Prepare the Network Step 1: Ca...

Prepare the Network Step 1: Cable a network that is similar to the one in the topology diagram.  You can use any current switch in your lab as long as it has the needed inte

State the example of intranet security, State the example of intranet secur...

State the example of intranet security Imagine a situation when a company develops a major new product secretly using its Intranet. Hackers break the security and take away all

How l2f establishes the tunnel, Can you describe the broader steps of how L...

Can you describe the broader steps of how L2F establishes the tunnel?

Original classes of ip addresses, The original IP address procedure divides...

The original IP address procedure divides host addresses into three base classes. The class of an address calculates the boundary between the network suffix and prefix. The origina

What is groupware, What is Groupware Groupware are a collection of sof...

What is Groupware Groupware are a collection of software tools that encompass a broad range of applications. Even though groupware broadly consists of applications like calend

Differentiate between fast fading and slow fading, Differentiate between Fa...

Differentiate between Fast fading and Slow fading Fast fading refers to changes in signal strength among a transmitter and receiver as the distance among the two changes by a s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd