How many instruction bytes are fetched

Assignment Help Computer Engineering
Reference no: EM131270226

Question: Your task is to compare the memory efficiency

Bookmark

Your task is to compare the memory efficiency of four different styles of instruction set architectures. The architecture styles are

Accumulator-All operations occur between a single register and a memory location.

Memory-memory-All instruction addresses reference only memory locations.

Stack-All operations occur on top of the stack. Push and pop are the only instructions that access memory; all others remove their operands from the stack and replace them with the result. The implementation uses a hardwired stack for only the top two stack entries, which keeps the processor circuit very small and low cost. Additional stack positions are kept in memory locations, and accesses to these stack positions require memory references.

Load-store-All operations occur in registers, and register-to-register instructions have three register names per instruction.

To measure memory efficiency, make the following assumptions about all four instruction sets: - All instructions are an integral number of bytes in length.

The opcode is always one byte.

Memory accesses use direct, or absolute, addressing.

The variables A, B, C, and D are initially in memory.

a. Invent your own assembly language mnemonics (examples in lecture note provide a useful sample to generalize), and for each architecture write the best equivalent assembly language code for this high-level language code sequence:

A = C + C;
D = A - B;
D = D + A;

b. Label each instance in your assembly codes for part (a) where a value is loaded from memory after having been loaded once. Also label each instance in your code where the result of one instruction is passed to another instruction as an operand, and further classify these events as involving storage within the processor or storage in memory.

c. Assume that the given code sequence is from a small, embedded computer application, such as a microwave oven controller, that uses a 16-bit memory address and data operands. If a load-store architecture is used, assume it has 16 general-purpose registers. For each architecture answer the following questions: How many instruction bytes are fetched? How many bytes of data are transferred from/to memory? Which architecture is most efficient as measured by total memory traffic (code + data)?

d. Now assume a processor with 64-bit memory addresses and data operands. For each architecture answer the questions of part (c). How have the relative merits of the architectures changed for the chosen metrics?

Reference no: EM131270226

Questions Cloud

Calculate marginal cost for a firm in industry : Demand P (q)=100-2q Total Costs C(q)=10+20q. Calculate marginal cost for a firm in this industry. The marginal cost is graphed below, what is special or interesting about this marginal cost function?
Transportation problem : Suppose that country A, country B and country C produce all the apples, bananas and oranges in the world. The world’s demand for apples requires 90 million acres of land devoted to apple production, 90 million acres of land for bananas and 100 millio..
Write an hdl module that computes a four-input xor function : Sketch a schematic of the circuit described by the following HDL code. Simplify the schematic so that it shows a minimum number of gates.
Find weekly revenue function and weekly profit function : Revenue, cost, and profit functions:- Find the weekly revenue function R(x, y) and the weekly profit function P(x, y). Evaluate R(10, 15) and P(10, 15).
How many instruction bytes are fetched : How many instruction bytes are fetched? How many bytes of data are transferred from/to memory? Which architecture is most efficient as measured by total memory traffic (code + data)?
Case study does big data bring big rewards : Case study "does big data bring big rewards?"  Why would a customer database be so useful for the companies described in this case? What would happen if these companies had not kept their customer data in databases? How did better management and anal..
Calculation of the gross domestic product : Explain why factors that are not part of the calculation of the Gross Domestic Product (GDP) can be important exclusions that have important meaning for understanding domestic macro-economics.
Political and economic arguments against free trade : What are the major political and economic arguments against free trade?
What are the principal features of us health policy : What are the principal features of U.S. health policy? What are the various stages in the policy cycle.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd