Example of structural hazards - computer architecture, Computer Engineering

Example of Structural hazards - computer architecture:

A machine has shared a single-memory pipeline for instructions and data. As a consequence, when an instruction which contains a data-memory reference (load), it will conflict with the instruction reference for a afterward instruction

(instr 3):

 

2043_Example of Structural hazards.png

 

To overcome from this problem, we stall the pipeline for 1 clock cycle when a data-memory access take place. The effect of the stall is in fact to occupy the resources for that instruction slot. The following table denoted how the stalls are in fact implemented.

 

2063_Example of Structural hazards1.png

 

2333_Example of Structural hazards2.png

Instr 1 suppose not to be data-memory reference (load or store), or else Instr 3 cannot begin execution for the similar reason as shown above.

To make simple the picture it is also commonly exposed like this:

2171_Example of Structural hazards3.png

Introducing stalls reduced performance as we discussed before.  Why, then, would the designer permit structural hazards? There are 2 reasons:

  • To reduce the latency of the unit. The smaller latency comes from the lack of pipeline registers that introduce overhead.
  • To reduce cost. For instance, machines that support an instruction and a cache both access every cycle (to stop the structural hazard of the above instance) need at least twice of the total memory.

 

Posted Date: 10/13/2012 4:21:25 AM | Location : United States







Related Discussions:- Example of structural hazards - computer architecture, Assignment Help, Ask Question on Example of structural hazards - computer architecture, Get Answer, Expert's Help, Example of structural hazards - computer architecture Discussions

Write discussion on Example of structural hazards - computer architecture
Your posts are moderated
Related Questions
TARGET = "_blank" "_blank" opens new document in a new window. Run the code given in Figure and check how it works. This value doesn't require the use of any frames. "_blank"

Name and explain the popular techniques to identify free memory areas as a result of allocation and de-allocations in a heap. Two well-liked techniques to identify free memory

What types of calendars can you create with Google Calendar? Personal calendars, like default calendar Public calendars, which others can access through the web

How many lists can a program can produce? Every program can produce up to 21 lists: one basic list and 20 secondary lists.  If the user makes a list on the next level (that is,

Q. Define Colour Depth in graphic display system? It is clear that an image contains an array of pixels.  If we tell which pixels are 'off' and which are 'on' to the monitor, i

Echo suppressor is detrimental to full duplex operation because? This disables one of the two pairs in a four-wire trunk line while a signal is detected upon another pair.

What are the differences between a Database index and a match code? Match code can have fields from several tables whereas an index can have fields from only one table.

States the term IP addresses? IP address considers to the name of a computer onto a network, as the Internet. a. An Identifier for a device or computer onto a TCP/IP network

What is the need of a hybrid in telephone networks? Digital exchanges need receive and transmit signals upon separate two-wire circuits. It calls for two-wire to four-wire con

Of the two "next screen "attributes the attributes that has more priority is?? Dynamic.