hi..can you please help me with this question?..thank you..
2. b) i) The number of stages are 8 namely FE1, FE2, Decode, Issue, 3 stages of Execution and Write Back.
ii) The instruction throughput of the processor is increased by implementing more pipelines. The more pipeline stages a processor has, the more instructions it can process simultaneously and the less is the latency between completed instructions. Thus a 20-stage pipeline performs better than a 3-stage or 4-stage pipeline.
2. c) i)
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
|
Instruction 1 |
FI |
DA |
FO |
EX |
|||||
Instruction 2 |
FI |
DA |
FO |
EX |
|||||
Instruction 3 |
FI |
DA |
EX |
||||||
Instruction 4 |
FI |
DA |
|||||||
Instruction 5 |
FI |
||||||||
Instruction 6 |
FI |
DA |
FO |
EX |
|||||
Instruction 7 |
FI |
DA |
E |
ii) Instruction 4 was fetched while instruction 3 was being decoded. In the next time interval, instruction 3 was executed while instruction 4 was decoded, as per the pipeline. On execution of instruction 3, control moves to instruction 6 irrespective of the status of the next instructions in the pipeline.
iii) When the JUMP instruction is implemented, a branch hazard occurs in the pipeline. By the time instruction 3 is executed, instruction 4 is already decoded and instruction 5 has been fetched. Thus instruction 6 is not executed immediately after instruction 3, as should have been the case. This problem is known as the pipeline branch hazard.
iv) Two mechanisms to mitigate the impact of the branch hazards are:
a. Branch prediction- a prediction is made based on past records as to whether a instruction will jump to another instruction or not. If the prediction is correct, the problem is resolved otherwise it persists.
b. Delayed branching- when the branch instruction completes execution, the instructions already in the pipeline are allowed to go to completion. The next instruction to be fetched is the branched instruction and all intermediate instructions are ignored.
hi..can you please help me with this question?..thank you.. QUESTION 2 The pipeline in the ARMI1...
Hi can you please help me with the question?..thank you.. QUESTION 2 The pipeline in the ARMI1 CPU is shown in Figure Q2(a). There are three possible (a) paths through the pipeline. The path of the execution depends on what type of instruction is executing (b) Instruction Fetoh Write Decode Execute Back Address DCI Dcz WBIS FE1 FE2 Decode Issue Shif ALU Saturate WBes MAC2 МАСI МАСУ Figure Q2(a) (i) Identify the number of stages for the ARMI1 CPU pipelines....
A 5-Stage pipeline is composed of the following stages Instruction Fetch (IF), Decode (DE), Execute (EX), Memory Access (ME) and Register Write-back (WB). Assume the pipeline does not have a branch prediction unit, does not have superscalar support and does not support out of order execution. Assume that all memory accesses are in the L1 cache and therefore do not introduce any stalls. Show a pipeline diagram that shows the execution of each stage for the assembly code below. Also...
RISC machines than in superscalar processuIS. (c) Show the pipeline activity for the following code fragment with and without applying the delayed branch technique. Assume that there are three pipeline stages (fetch-decode, address calculation, data movement) for load and store instructions and two stages (fetch-decode, execute) for ALU instructions. Address Instruction Comment 100 LOAD RA,X X ->RA 101 LOAD RB,Y ADD RA,RB RA RB -> RA 102 103 104 JUMP 106 ADD RB,1 STORE Y, RB STORE X,RA RB-> Y...
2. (a) Briefly describe the compiler-based register optimization technique (typically (4 marks) (b) Describe the delayed branch technique and explain why it is more common in (4 marks) tetch, indirect and moon used for RISC machines). (c) Show the pipeline activity for the following code fragment with and without applying the delayed branch technique. Assume that there are three pipeline stages (fetch-decode, address calculation, data movement) for load and store RISC machines than in superscalar processors. instructions and two stages...
Page 4 3. Pipeline is an instruction-level parallel processing techni microprocessor systems. The instruction throughput can be dramaticallu increased by this key technique. However, there are so called hazard problems. (a) Branch instruction will introduce problems to a pipelined instruction execution. Explain how this may happen in a DLX machine, and state ONE strategy that can be used to resolve the problem (6 marks) (b) Data hazards occur in instruction execution in a pipelined machine. () What is meant by...
The latencies of individual stages in five-stage MIPS (Microprocessor without Interlocked Pipeline Stages) Architecture are given below. Instruction Instruction Fetch Register Read Arithmetic Logic Unit (ALU) Memory Access Register Write Latency 200ps 100ps 200ps 300ps 100ps a. (10 pts) What is the clock cycle time in a pipelined and non-pipelined processor? Pipelined version : ______________ Non-pipelined version : ______________ b. The classic five-stage pipeline MIPS architecture is used to execute the code fragments. Assume the followings: Register write is done...
Draw the pipeline diagram with data dependency considered Appendix A Pipelining: Basic and Intermediate Concepts Data hazards occur when the pipeline changes the order of read/write accesses to operands so that the order differs from the order seen by sequentially executing instructions on an unpipelined processor. Consider the pipelined execution of these instructions: DADD DSUB AND OR XOR R1,R2,R3 R4, R1,R5 R6, R1,R7 R8, R1,R9 R10,R1,R11 All the instructions after the DADD use the result of the DADD instruction. As...
1. Given the following instruction sequence for the MIPS processor with the standard 5 stage pipeline $10, S0. 4 addi lw S2.0(S10) add sw S2,4(510) $2, $2, $2 Show the data dependences between the instructions above by drawing arrows between dependent instructions (only show true/data dependencies). a. Assuming forwarding support, in what cycle would the store instruction write back to memory? Show the cycle by cycle execution of the instructions as they execute in the pipeline. Also, show any stalls...
Consider a standard 5-stage MIPS pipeline of the type discussed during the class sessions: IF- ID-EX-M-WB. Assume that forwarding is not implemented and only the hazard detection and stall logic is implemented so that all data dependencies are handled by having the pipeline stall until the register fetch will result in the correct data being fetched. Furthermore, assume that the memory is written/updated in the first half of the clock cycle (i.e. on the rising edge of the clock) and...
Computer Architecture The format of this document is as follows: First, I give a practice problem for which the solution is also provided. In bold italic font, I slightly modify the problem for your homework. 3) The 4-Stage Pipeline below suffers from the memory access resource conflict as shown below (instruction i and i+2 want to access memory at the same time and i+2 needs to be denied, so it waits for the next cycle; in the next cycle it...