Types of pipelines - computer architecture, Computer Engineering

Assignment Help:

Types of Pipelines:

Instructional pipeline

 It is used where different stages of an instruction fetch and execution take place in a pipeline.

Arithmetic pipeline

 It is used where different stages of an arithmetic operation take place along the stages of a pipeline.

The definitions are right but are based on a narrow perspective, assume only the central processor. There is other type of computing pipelines. Pipelines are used to compress data and transfer video data. Another is to use of specialized hardware to perform graphics display tasks. According to Ware Myers:

"...the pipeline concept ... transforms a model of some object into representations that in succession become more machine-dependent and lastly results in an image upon a specific screen.

This instance of pipelining fits the definitions from Hayes and Chen but not the from Tabaz. These broader categories are beyond the scope of this paper and are specified only to alert the reader that different authors mean different things when referring to pipelining.

 


Related Discussions:- Types of pipelines - computer architecture

How are comparisons done in 8086 assembly language, Q. How are comparisons ...

Q. How are comparisons done in 8086 assembly language? There is a compare instruction CMP. Though this instruction just sets the flags on comparing two operands (both 16 bits

What are the data types of the external layer, What are the Data types of t...

What are the Data types of the external layer? The Data types of the external layer are :- ACCP, Char, CLNT, CUKY, CURR, DATS, DESC, FLTP, INT1, INT2, INT4, LANG, LCHR, L

Define the meaning of business-to-business, Define the meaning of business-...

Define the meaning of business-to-business. B2B (business-to-business): The consensus is universal: it is the priority; it is where the money is. It’s rather true; theref

Determine about the security policy, Determine about the Security Policy ...

Determine about the Security Policy In the United States, the government has a separate organisation looking after the security measures and providing guidelines to all departm

What is verilog case 1, What is verilog case (1) ? wire [3:0] x; al...

What is verilog case (1) ? wire [3:0] x; always @(...) begin case (1'b1) x[0]: SOMETHING1; x[1]: SOMETHING2; x[2]: SOMETHING3; x[3]: SOMETHING4; endcase

Mobility management in mobile systems, Instruction 1. You can do this i...

Instruction 1. You can do this individually or in groups of 2-3 students. 2. Any material copied and pasted from anywhere (e.g., figures and text) is considered plagiarism even

Dataflow computing, Dataflow Computing A different to the von Neumann m...

Dataflow Computing A different to the von Neumann model of computation is the dataflow computation model. In a dataflow model, control is fixed to the flow of data. The order o

C++, a program to find the area under the curve y = f(x) between x = a and ...

a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two points can be foun

Domains of artificial intelligence, The major domains of AI research and...

The major domains of AI research and development. AI applications can be grouped under three major areas cognitive science robotics and natural interfaces though these class

Determine the adding operations of describe function, Adding Operations of ...

Adding Operations of describe function  Whenever take a look at the operations in OOPs you find queries about attributes or associations in object model (such as student.name)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd