Crafting an isa - computer architecture, Computer Engineering

Crafting an ISA:

  • We will look at some decisions facing an instruction set architect, and
  • In the design of the MIPS instruction set how those decisions were made.
  • MIPS, such as PowerPC, SPARC and Alpha AXP, is a RISC (Reduced Instruction Set Computer) ISA.
  • few instruction formats
  • load/store architecture
  • fixed instruction length
  • RISC architectures worked due to the reason they enabled pipelining. They carry on thriving because they enable parallelism.

1449_Crafting an ISA.png

Posted Date: 10/13/2012 3:25:31 AM | Location : United States







Related Discussions:- Crafting an isa - computer architecture, Assignment Help, Ask Question on Crafting an isa - computer architecture, Get Answer, Expert's Help, Crafting an isa - computer architecture Discussions

Write discussion on Crafting an isa - computer architecture
Your posts are moderated
Related Questions
Q. Terminates a particular PVM process? int pvm_kill( int tid ) Terminates a particular PVM process. tid Integer task identifier of PVM process to be killed (not itself).

Processing elements (PEs)  : Every processing element consists of ALU, local memory and its registers  for storage of distributed data. This PEs has been interconnected via an inte


Give some examples of malicious data.  In May 2002, the Norton Anti-Virus software for Windows operating systems detects about 61000 malicious programs. Some of them are named

What is Hamiltonian path?  A Hamiltonian path in a directed graph G is a directed path that goes by each node exactly once. We consider a special case of this difficulty where

Q. What is Stack and register manipulation? Stack and register manipulation: If we create stacks, stack instructions prove to be useful. LOAD IMMEDIATE is a good illustration

Arithmetic Pipelines The technique of pipelining can be applied to various complex and low arithmetic operations to speed up processing time. Pipelines used for arithmetic calc

Q. Program size for different Instruction Set Approaches? Assumptions: Complex Instruction is: Add C, A, B having 16 bit addresses and 8 bit data operands All opera

Define user mode and Kernel mode Kernel is a private mode in that no limitation is imposed on the kernel of system. Kernel may be use all the information of the processor, oper

How is it possible to make a module 2 n counter using N-flipflops?  Name the two types of such counters. Ans: Module 2 n counter counts total 2 n distinguishable states w