Problem occurs during pipelining , Basic Computer Science

Assignment Help:
While pipelining can cruelly cut the time taken to execute a program, there are troubles that cause it to not work as well as it possibly shall. The three stages of the instruction execution process do not essentially take an equal amount of time, with the time taken for ''execute'' being usually longer than ''fetch''. This makes it much harder to synchronize a variety of stages of the different instructions. Also, some instructions may be dependent on the results of other previous instructions. This can arise when data produced previous needs to be used, or when a conditional branch based on a previous result is used.
One of the easiest ways in which the effects of these troubles can be reduced is by breaking the instruction execution cycle into stages that are more possible to be of an equal duration.
Although, while this may resolve some of the troubles outlined above, it is not without creating further tribulations of its own. Initially, it is not always the case than an instruction will use all six of these stages. Easy load instructions, for example, will not require the use of the final ''write operand'' stage, which would perhaps upset the synchronization. There is also the matter of potential variances within the memory system, as three of the above stages (fetch instruction, fetch operands, write operand) need access to the memory. Many memory management systems would not permit three separate instructions to be accessing the memory immediately, and hence the pipelining would not be as useful as it would first seem.
On top of this, the difficulty of conditional branching and consequence dependant instructions also occurs. This means that the processor requires to be designed well so as to cope with these potential interruptions to the flow of data. As you can tell, there are many subjects which need to be taken into consideration involving to the technique of pipelining. While it is a powerful method for the purpose of increasing CPU performance, it does need careful design and consideration so as to achieve the best possible results.

Related Discussions:- Problem occurs during pipelining

Simple batch systems, Simple Batch Systems: Early machines were very...

Simple Batch Systems: Early machines were very expensive, and therefore it was important to maximize machine utilization. To improve utilization, the concept of batch operat

System software, System software: System software helps run the  compu...

System software: System software helps run the  computer hardware and system. It is designed to control the operations of a computer and coordinate all external devices like c

Data mining analysis, Using Weka 3.6 (basketball or cloud data set). Using ...

Using Weka 3.6 (basketball or cloud data set). Using the EM clustering method, how many clusters did the algorithm decide to make? If we change from "Use Training Set" to "Percenta

About flag instructions, They straightforwardly affect the content of the f...

They straightforwardly affect the content of the flags. CLC CLD CLI CMC STC STD STI CLC INSTRUCTION Reason: To uncontaminated the cartage flag. Syntax: CLC This instruction turning

Computer as a data processor, Computer as a Data Processor: The main f...

Computer as a Data Processor: The main function of a computer is to process the input data according to a specific program to produce the desired output. This is the reason wh

What is blu-ray disk, Question 1 Explain the configuration steps involved ...

Question 1 Explain the configuration steps involved in CMOS setup Date and time Error halt Floppy drive A Halt on Hard disk C HDD Delay Keyboard Memory

Sequential-access memory device, Sequential-access memory device: A  S...

Sequential-access memory device: A  Sequential-access  memory device reads data in sequence. In other words, information on a serial device can only be retrieved in the same s

Cryptography, Consider the one-time pad encryption scheme to encrypt a 1-bi...

Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "message

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd