3. Consider a pipeline in a processor that has 5 stages: (1) instruction fetch – 120 ns, (2) instruction decode - 30 ns (3) memory read - 80 ns (4) instruction execution - 30 ns and (5) register write – 80 ns. The times required in each stage are shown above

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

3. i and ii no handwriting, please 

3. Consider a pipeline in a processor that has 5 stages: (1) instruction fetch – 120 ns, (2)
instruction decode – 30 ns (3) memory read – 80 ns (4) instruction execution – 30 ns
and (5) register write – 80 ns. The times required in each stage are shown above
following the name of the stage. For example, the instruction fetch requires 120 ns to
complete. Assume that every instruction in the instruction set requires the use of all
stages of the pipeline. Also assume that the stages of the pipeline are clocked with a
common clock. This means that all information moves synchronously through the
pipeline from one stage to the next based on a single clock signal dictating when
information advances from one stage to the next.
(0)
Identify the execution time of a 5000-instruction program without
pipelining.
What can you infer on the latency of an instruction flowing through the
pipeline? (Remember that you have a common clock)
Since all stages of the pipeline are clocked with a single clock, interpret
the fastest frequency of the clock for this pipeline.
Draw your conclusion on the idealised throughput of the pipeline.
(Assume that there are no hazards between instructions).
Assume that the following sequence of instructions is executed by the
(i)
(ii)
(iv)
(v)
processor:
11, 12, 13, 14, 15 with a data hazard between 12 and 13 and a memory
resource hazard between 13 and 15.
Using the Table below, write the instruction that resides in the Memory Read,
Instruction Execution and Register Write stages of the pipeline for each
period (from T1 to T13) taking into consideration the delay required to correct
the data hazard between 12 and 13 and the memory resource hazard
between 13 and 15.
Clock
period
T1
Instruction
Instruction
Memory
Read
Instruction
Write
fetch
decode
execution
back
11
T2
12
T3
T4
T5
T6
T7
T8
T9
Transcribed Image Text:3. Consider a pipeline in a processor that has 5 stages: (1) instruction fetch – 120 ns, (2) instruction decode – 30 ns (3) memory read – 80 ns (4) instruction execution – 30 ns and (5) register write – 80 ns. The times required in each stage are shown above following the name of the stage. For example, the instruction fetch requires 120 ns to complete. Assume that every instruction in the instruction set requires the use of all stages of the pipeline. Also assume that the stages of the pipeline are clocked with a common clock. This means that all information moves synchronously through the pipeline from one stage to the next based on a single clock signal dictating when information advances from one stage to the next. (0) Identify the execution time of a 5000-instruction program without pipelining. What can you infer on the latency of an instruction flowing through the pipeline? (Remember that you have a common clock) Since all stages of the pipeline are clocked with a single clock, interpret the fastest frequency of the clock for this pipeline. Draw your conclusion on the idealised throughput of the pipeline. (Assume that there are no hazards between instructions). Assume that the following sequence of instructions is executed by the (i) (ii) (iv) (v) processor: 11, 12, 13, 14, 15 with a data hazard between 12 and 13 and a memory resource hazard between 13 and 15. Using the Table below, write the instruction that resides in the Memory Read, Instruction Execution and Register Write stages of the pipeline for each period (from T1 to T13) taking into consideration the delay required to correct the data hazard between 12 and 13 and the memory resource hazard between 13 and 15. Clock period T1 Instruction Instruction Memory Read Instruction Write fetch decode execution back 11 T2 12 T3 T4 T5 T6 T7 T8 T9
Expert Solution
steps

Step by step

Solved in 3 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY