Question

(a) Fill in the following pipeline timing chart showing the execution of the first 5 instructions as- suming that NO forwarding is available I1: LUI R1, 0x1234 I2: ORI R1, R1, 0x0010 I3: LW I4: LW I5: SUB R4, R3, R2 I6: BGEZ R4, +4 17: SUB R4, R2, R3 I8: SW ; load upper 2 bytes of R1 R2, 0 (R1) R3, 4 (R1) ; load A ; load B compute B-A compute A-B R4, 8 (R1) ;store the abs value 1 2 3 45 6 789 1011 12 13 14 15 16 17 18 19 20 I1: LUI R1, 0x1234 I2: ORI R1, R1, 0x0010 I3: LW R2, (R1) I4: LW R3, 4(R1) IS: SUB R4, R3, R2 I6: BGEZ R4, +4 I7: SUB R4, R2, R3 I8: SW R4, 8(R1) 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 I1: LUI R1, 0x1234 I2: ORI R1, R1, 0xe010 13: LW R2,0(R1) I4: LW R3, 4(R1) I5: SUB R4, R3, R2 I6: BGEZ R4, +4 17: SUB R4, R2, R3 I8: SW R4, 8(R1)

0 0
Add a comment Improve this question Transcribed image text
Answer #1

for for any query please comment.

Add a comment
Know the answer?
Add Answer to:
(a) Fill in the following pipeline timing chart showing the execution of the first 5 instructions...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Assembly code time

    Consider the following assembly language code:I0: add $R4,$R1,$R0                             //ADD R4 = R1 + R0;I1: lw $R1,100($R3)                             //LDW R1 = MEM[R3 + 100];I2: lw $R9,4,($R1)                                // LDW R9 = MEM[R1 + 4];I3: add $R3,$R4,$R9                             //ADD R3 = R4 + R9;I4: lw $R1,0($R3)                                 //LDW R1 = MEM[R3 + 0];I5: sub $R3,$R1,$R4                             //SUB R3 = R1 - R4;I6: and $R9,$R9,$R7                             //AND R9 = R9 & R7;I7: sw $R2,100($R4)                             //STW MEM[R4 + 100] = R2;I8: and $R4,$R2,$R1                             //AND R4 = R2 & R1;I9: add...

  • Consider the execution of the program below on a fully bypassed (i.e. both W-E and M-E...

    Consider the execution of the program below on a fully bypassed (i.e. both W-E and M-E operand forwarding), 5-stage MIPS pipeline with early branch resolution (i.e., branches resolved in D stage). i1: add $v0, $0, $0 i2: addi $t0, $0, 100 i3: lw $t1, 0($a0) i4: add $v0, $v0, $t1 i5: addi $a0, $a0, 4 i6: addi $t0, $t0, -1 i7: beq $t0, $0, end I8: beq $0, $0, i3 end: Which lines in the program would require stalls based...

  • a) Describe the main techniques used by superscalar processors to achieve a high degree of machine-level parallelism. Consider the following assembly code: I1: LOAD r3 (r1) TO 12: MOVE r4 #1 1...

    a) Describe the main techniques used by superscalar processors to achieve a high degree of machine-level parallelism. Consider the following assembly code: I1: LOAD r3 (r1) TO 12: MOVE r4 #1 13: ADD r3 r3 r4 I4: LOAD r2 (r2) 15: MOVE r4 #2 I6: MUL r2 r2 r4 17: MUL r3 r3 r2 I8: LOAD r4 (r1) 19: MOVE r1 #3 I10: ADD r4 r4 r1 I11: MUL r3 r3 r4 Using register renaming reorganise the code from the...

  • a) Describe the main techniques used by superscalar processors to achieve a high degree of machine-level...

    a) Describe the main techniques used by superscalar processors to achieve a high degree of machine-level parallelism. Consider the following assembly code: I1: LOAD r3 (r1) TO 12: MOVE r4 #1 13: ADD r3 r3 r4 I4: LOAD r2 (r2) 15: MOVE r4 #2 I6: MUL r2 r2 r4 17: MUL r3 r3 r2 I8: LOAD r4 (r1) 19: MOVE r1 #3 I10: ADD r4 r4 r1 I11: MUL r3 r3 r4 Using register renaming reorganise the code from the...

  • Ch04.2. [3 points] Consider the following assembly language code: I0: ADD R4 R1RO I1: SUB R9R3 R4...

    Ch04.2. [3 points] Consider the following assembly language code: I0: ADD R4 R1RO I1: SUB R9R3 R4; I2: ADD R4 - R5+R6 I3: LDW R2MEMIR3100]; 14: LDW R2 = MEM [R2 + 0]; 15: STW MEM [R4 + 100] = R3 ; I6: AND R2R2 & R1; 17: BEQ R9R1, Target; I8: AND R9 R9&R1 Consider a pipeline with forwarding, hazard detection, and 1 delay slot for branches. The pipeline is the typical 5-stage IF, ID, EX, MEM, WB MIPS...

  • Show how the same four instructions move through each stage of the five stage pipeline, similar...

    Show how the same four instructions move through each stage of the five stage pipeline, similar to the example on slide 13 of lecture 17. This pipeline does support bypassing. Make sure the decode stage does not advance an instruction through the pipeline unless all data dependences are correctly resolved. You don't need to show the latch involved in every bypass (but feel free to ponder this question for your own understanding). (25 points) I1: add $s1, $s2, $s3 I2:...

  • (60 points) The following instructions are executed on the 5-stage MIPS pipelined datapath. add r...

    Computer architecture help: (60 points) The following instructions are executed on the 5-stage MIPS pipelined datapath. add r5,r2, r1 lw r3, 4(r5) lw r2, 0(r2) or r3, r5, r3 sw r3, 0(r5) (a) (20 points) List the data hazards in the above code. For each data hazard identified, clearly mark the source and the destination. For example you can say, there is a data hazard from instruction X to instruction Y on register Z. (b) (20 points) Assume there is...

  • Page 4 3. Pipeline is an instruction-level parallel processing techni microprocessor systems. The instruction throughput can be dramaticallu increased by this key technique. However, there are so...

    Page 4 3. Pipeline is an instruction-level parallel processing techni microprocessor systems. The instruction throughput can be dramaticallu increased by this key technique. However, there are so called hazard problems. (a) Branch instruction will introduce problems to a pipelined instruction execution. Explain how this may happen in a DLX machine, and state ONE strategy that can be used to resolve the problem (6 marks) (b) Data hazards occur in instruction execution in a pipelined machine. () What is meant by...

  • . U 8. (15 pts) Assuming the code fragment below is executed by the classic 5-stage...

    . U 8. (15 pts) Assuming the code fragment below is executed by the classic 5-stage MIPS architecture, answer the following questions. Ll: lw RI, O (R5) // 11 add R2, Ri, 20 // 12 lw R3, 0(R6) // 13 add R3, R2, R3 SW R3, 0(R5) addi R4, R4,-4 // 16 addi R5, R5,4 // 17 addi R6, R6,4 // 18 bne R4, RO, L1 // 19 a. (5 pts) Assuming R5 holds the address of array A, R6...

  • Consider a standard 5-stage MIPS pipeline of the type discussed during the class sessions: IF- ID-EX-M-WB....

    Consider a standard 5-stage MIPS pipeline of the type discussed during the class sessions: IF- ID-EX-M-WB. Assume that forwarding is not implemented and only the hazard detection and stall logic is implemented so that all data dependencies are handled by having the pipeline stall until the register fetch will result in the correct data being fetched. Furthermore, assume that the memory is written/updated in the first half of the clock cycle (i.e. on the rising edge of the clock) and...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT