How many instruction bytes are fetched

Assignment Help Computer Engineering
Reference no: EM131270226

Question: Your task is to compare the memory efficiency

Bookmark

Your task is to compare the memory efficiency of four different styles of instruction set architectures. The architecture styles are

Accumulator-All operations occur between a single register and a memory location.

Memory-memory-All instruction addresses reference only memory locations.

Stack-All operations occur on top of the stack. Push and pop are the only instructions that access memory; all others remove their operands from the stack and replace them with the result. The implementation uses a hardwired stack for only the top two stack entries, which keeps the processor circuit very small and low cost. Additional stack positions are kept in memory locations, and accesses to these stack positions require memory references.

Load-store-All operations occur in registers, and register-to-register instructions have three register names per instruction.

To measure memory efficiency, make the following assumptions about all four instruction sets: - All instructions are an integral number of bytes in length.

The opcode is always one byte.

Memory accesses use direct, or absolute, addressing.

The variables A, B, C, and D are initially in memory.

a. Invent your own assembly language mnemonics (examples in lecture note provide a useful sample to generalize), and for each architecture write the best equivalent assembly language code for this high-level language code sequence:

A = C + C;
D = A - B;
D = D + A;

b. Label each instance in your assembly codes for part (a) where a value is loaded from memory after having been loaded once. Also label each instance in your code where the result of one instruction is passed to another instruction as an operand, and further classify these events as involving storage within the processor or storage in memory.

c. Assume that the given code sequence is from a small, embedded computer application, such as a microwave oven controller, that uses a 16-bit memory address and data operands. If a load-store architecture is used, assume it has 16 general-purpose registers. For each architecture answer the following questions: How many instruction bytes are fetched? How many bytes of data are transferred from/to memory? Which architecture is most efficient as measured by total memory traffic (code + data)?

d. Now assume a processor with 64-bit memory addresses and data operands. For each architecture answer the questions of part (c). How have the relative merits of the architectures changed for the chosen metrics?

Reference no: EM131270226

Questions Cloud

Calculate marginal cost for a firm in industry : Demand P (q)=100-2q Total Costs C(q)=10+20q. Calculate marginal cost for a firm in this industry. The marginal cost is graphed below, what is special or interesting about this marginal cost function?
Transportation problem : Suppose that country A, country B and country C produce all the apples, bananas and oranges in the world. The world’s demand for apples requires 90 million acres of land devoted to apple production, 90 million acres of land for bananas and 100 millio..
Write an hdl module that computes a four-input xor function : Sketch a schematic of the circuit described by the following HDL code. Simplify the schematic so that it shows a minimum number of gates.
Find weekly revenue function and weekly profit function : Revenue, cost, and profit functions:- Find the weekly revenue function R(x, y) and the weekly profit function P(x, y). Evaluate R(10, 15) and P(10, 15).
How many instruction bytes are fetched : How many instruction bytes are fetched? How many bytes of data are transferred from/to memory? Which architecture is most efficient as measured by total memory traffic (code + data)?
Case study does big data bring big rewards : Case study "does big data bring big rewards?"  Why would a customer database be so useful for the companies described in this case? What would happen if these companies had not kept their customer data in databases? How did better management and anal..
Calculation of the gross domestic product : Explain why factors that are not part of the calculation of the Gross Domestic Product (GDP) can be important exclusions that have important meaning for understanding domestic macro-economics.
Political and economic arguments against free trade : What are the major political and economic arguments against free trade?
What are the principal features of us health policy : What are the principal features of U.S. health policy? What are the various stages in the policy cycle.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Define open-source and proprietary databases

describe open-source and proprietary databases. What are some advantages and disadvantages of each type of database? What characteristics a business should consider when choosing a database.

  Write down each interaction between you and your smartphone

Suppose your smartphone as a system and use its calendar to set a calendar event with a reminder for your birthday.

  Questionselect an information scheme used in your

questionselect an information scheme used in your association or in your school. interview a systems analyst or

  Charlie likes alices picture-password system of the prior

charlie likes alices picture-password system of the previous exercise but he has changed the login so that it just

  Explain a mechanism by which an operating system can

describe a mechanism by which an operating system can enforce limited transfer of capabilities.that is process a might

  Produce a low score for different maps

IS103 Computational Thinking Project. Your challenge is to come up with a get_pokestops method that returns selected stops that produce a low score (the lower the better) for different maps and number of stops

  Next generation technology grants access based on human

next generation technology grants access based on human attributes?

  Would this proposed solution meet the requirements

Your company has just occupied an old historic building in which 15 employees will work. because of historic building codes, the company is not permitted to run cables inside walls or ceilings.

  Explain why is it so important to test the cabling and

why is it so important to test the cabling and connector terminations on a computer network? envision common cabling

  Why using euler''s method is the simplest numerical method

This is being solved by computer code in c++ to obtain numerical approx to ODE. Using Euler's method is the simplest numerical process for approximation solving initial value ODE'S.

  In brief describe the role of information systems in an

question 1 briefly explain the role of information systems in an organization.your response should be at least 200

  A school cafeteria is providing an electronic survey to its

a school cafeteria is giving an electronic survey to its students to improve their lunch menu. create an app that uses

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd