Branch (control) hazards in computer architecture, Computer Engineering

Branch (control) hazards in computer architecture:

Branching hazards (also called control hazards) take place when the processor is told to branch -for example, if a definite condition is true, then jump instruction from 1 part of the instruction stream to another - not essentially to the next instruction sequentially. In such type   of case, the processor unable to tell in advance whether it should process the next instruction (instead it may have to move to a distant instruction).

It can result in the processor doing not needed actions.

A cache misses:- A cache miss stalls all  of the instructions on pipeline before and after both condition the instruction causing the miss.

 

 

Posted Date: 10/13/2012 4:22:55 AM | Location : United States







Related Discussions:- Branch (control) hazards in computer architecture, Assignment Help, Ask Question on Branch (control) hazards in computer architecture, Get Answer, Expert's Help, Branch (control) hazards in computer architecture Discussions

Write discussion on Branch (control) hazards in computer architecture
Your posts are moderated
Related Questions
What are the two levels in defining a Match Code? Match Code Object. Match Code Id.

First-Order Inference Rules -artificial intelligence: Now we have a perfect definition of a first-order model is,in the same way, we may define soundness for first-order infere

Define memory cycle time? It is the time delay needed between the initiations of two successive memory operations. Eg. The time among two successive read operations.

Canonical Genetic Algorithm: In such a scenario with all search techniques there one of the first questions to ask along with GAs is how to define a search space that is actua

Q. Find simplified function F and implement that function using only NAND gates. 1.  F(A,B,C) = (A+B) (A'+B+C') (A'+B'+C') 2.  F (A,B,C,D) = A'B'C'+B'CD'+A'BCD'+AB'C' 3.

Determine about the Voice Systems Speech recognizers are used in some graphics workstations as input devices to accept voice commands. The voice-system input can be used to ini

How many lines of address bus must be used to access 2048 bytes of memory when available RAM chips 128 × 8.  How many lines of these will be common to each chip? Ans. AS chips

How do you create special files like named pipes and device files? The system call method forms special files in the following sequence. Kernel assigns new inode,

Database marketing tool or application helps a user or marketing professional in determining the right tool or plan for his valuable add campaign. This tool haves data from all sou

Nested Macro calls are expanded using the? Ans. By using the LIFO (Last in First out) Nested Macro calls are expanded.