Computers and Technology
Computers and Technology, 21.02.2020 22:27, yol123

We will now add support for register-memory ALU operations tothe classic five-stage RISC pipeline. To offset this increase incomplexity, all memory addressing will be restricted to registerindirect (i. e., all addresses are simply a value held in aregister: no offset or displacement may be added to the registervalue). For example, the register-memory instruction ADD R4, R5,(R1) means add the contents of register R5 to the contents of thememory location with address equal to the value in register R1 andput the sum in register R4. Register-register ALU operations areunchanged. Answer the following for the integer RISCpipeline. a. List a rearranged order of the five traditional stages ofthe RISC pipeline that will support register-memory operationsimplemented exclusively by register indirect addressing. b. Describe what new forwarding paths are needed for therearranged pipeline by stating the source, destination, andinformation transferred on each needed new path. c. For the reordered stages of the RISC pipeline, what newdata hazards are created by this addressing mode? Give aninstruction sequence illustrating each new hazard. d. List all ways that the RISC pipeline with register-memory. ALU operations can have a different instruction count for a givenprogram than the original RISC pipeline. Give a pair of specificinstruction sequences, one for the original pipeline and one forthe rearranged pipeline, to illustrate each way. e. Assume all instructions take 1 clock cycle per stage. Listall ways that the register-memory RISC can have a different CPI fora given program as compared to the orginal RISC pipeline.

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 10:00, thezbell
What is estimated time of arrival (eta)? a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds a gps technology adventure game that posts the longitude and latitude location for an item on the internet for users to find a north/south measurement of position the time of day of an expected arrival at a certain destination and is typically used for navigation applications
Answers: 3
image
Computers and Technology, 23.06.2019 16:00, AM28
Does read theory have answers keys ?
Answers: 1
image
Computers and Technology, 24.06.2019 02:00, arubright177
Write an expression that will cause the following code to print "equal" if the value of sensorreading is "close enough" to targetvalue. otherwise, print "not equal". ex: if targetvalue is 0.3333 and sensorreading is (1.0/3.0), output is:
Answers: 1
image
Computers and Technology, 24.06.2019 04:30, andrespacheco5888
Which of the following terms refers to a collection of different types of software that share the goal of infiltrating a computer and making it do something? a- malware b- virus c- spyware d- trojan horse
Answers: 2
Do you know the correct answer?
We will now add support for register-memory ALU operations tothe classic five-stage RISC pipeline. T...

Questions in other subjects:

Konu
Mathematics, 30.11.2020 14:00