Explain the classification according to level of processing, Computer Networking

Assignment Help:

Classification according to level of processing

According to this categorization computer operations are classified like arithmetic operations and instruction execution. Subsequently we discuss below classes of this categorizations:

  • Instruction Pipeline: We know that an instruction cycle can comprise several operations such as decode opcode, fetch opcode, compute operand addresses, execute instructions, and fetch operands. These operations of instruction execution cycle may be realized by pipelining concept. Every of these operations represent one stage/phase of a pipeline. The overlapping of execution of operations via the pipeline offers a speedup over normal execution. So the pipelines used for instruction cycle operations are called instruction pipelines.
  • Arithmetic Pipeline: The complex arithmetic operation such as floating point and multiplication operations takes much of the time of ALU. These operations can too be pipelined by sectioning the operations of ALU and as a result high speed performance can be achieved. So the pipelines used for arithmetic functions are called as arithmetic pipelines.

 


Related Discussions:- Explain the classification according to level of processing

Describe the count-to-infinity problem in distance vector, Describe the cou...

Describe the count-to-infinity problem in distance vector

Domain names and address resolution, However what if you don't know about t...

However what if you don't know about the IP address of the computer you wished to connect to? What if you have to access a web server referred to as www.abc.com? How does your web

Encrypt and decrypt message cryptography, Submission instructions: Answer ...

Submission instructions: Answer the following questions using a text processing software and submit your answers via connex. Possible file formats for your submission file(s) are .

Explain fdm and tdm with example, Question 1 Explain FDM and TDM with exam...

Question 1 Explain FDM and TDM with example Question 2 Define B-ISDN and explain its services Question 3 What is symmetric key cryptography? Describe one symmetric

What is the mesh network, A network in which there is multiple network link...

A network in which there is multiple network links among computers to provide multiple paths for data to travel.

Explain anti-aliasing techniques, Question: (a) Explain the issue assoc...

Question: (a) Explain the issue associated with vertices when the scan line scan line polygon fill algorithm is being applied? (b) Explain the logic of shortening edges to a

Security control procedures , a) An Introduction/Overview of Network Securi...

a) An Introduction/Overview of Network Security issues. b) A Risk Assessment  analysis- to include:             Assets                                                         T

Data transfer - tcp connection management , Data Transfer After  conne...

Data Transfer After  connection  is established  bidirectional  data transfer  can take  place. The client  and  server  can both  send data  and acknowledgments. Figure  show

Snort deployed in the dmz network, Let's consider the network shown in Figu...

Let's consider the network shown in Figure 1 where Snort is deployed. In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? In Figure 1, say True or

Show the vulnerability of the internet, Q. Show the Vulnerability of the In...

Q. Show the Vulnerability of the Internet? More vulnerable than private network. Wide inter-network connection. Easy access by mass public world-wide. Lack of build in

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd