Example of structural hazards - computer architecture, Computer Engineering

Example of Structural hazards - computer architecture:

A machine has shared a single-memory pipeline for instructions and data. As a consequence, when an instruction which contains a data-memory reference (load), it will conflict with the instruction reference for a afterward instruction

(instr 3):

 

2043_Example of Structural hazards.png

 

To overcome from this problem, we stall the pipeline for 1 clock cycle when a data-memory access take place. The effect of the stall is in fact to occupy the resources for that instruction slot. The following table denoted how the stalls are in fact implemented.

 

2063_Example of Structural hazards1.png

 

2333_Example of Structural hazards2.png

Instr 1 suppose not to be data-memory reference (load or store), or else Instr 3 cannot begin execution for the similar reason as shown above.

To make simple the picture it is also commonly exposed like this:

2171_Example of Structural hazards3.png

Introducing stalls reduced performance as we discussed before.  Why, then, would the designer permit structural hazards? There are 2 reasons:

  • To reduce the latency of the unit. The smaller latency comes from the lack of pipeline registers that introduce overhead.
  • To reduce cost. For instance, machines that support an instruction and a cache both access every cycle (to stop the structural hazard of the above instance) need at least twice of the total memory.

 

Posted Date: 10/13/2012 4:21:25 AM | Location : United States







Related Discussions:- Example of structural hazards - computer architecture, Assignment Help, Ask Question on Example of structural hazards - computer architecture, Get Answer, Expert's Help, Example of structural hazards - computer architecture Discussions

Write discussion on Example of structural hazards - computer architecture
Your posts are moderated
Related Questions
Q. Illustrate working of rubber dome keyboards? Rubber Dome: In rubber dome keyboards both positioning and contact are controlled by a puckered sheet of elastomer that is a s

Question: The abundance of resources and the ease of access to cloud computing can help to bridge the gap the resource gap for mobile computing. Nevertheless some fundamental c

State the drawbacks of laptop compared to PC The main disadvantages of laptops compared to desk top PCs are: -  They tend to be more expensive to purchase -  It's easie

What is Fork swap? "Fork ()" is a system call to make a child process. When the parent process calls "fork()" system call, the child process is formed and if there is short of

Process: pid start time end time priority timeslice list of CPU bursts list of IO bursts (the number of IO burst will always be 1 less than the number of CPU

Automatic Stock Control System in a Supermarket -  Bar codes are associated to all goods/items sold by the supermarket as a means of identification -  Every bar code is asso

Ferroelectric RAM is a random-access memory same in construction to DRAM but uses a ferroelectric layer rather of a dielectric layer to achieve non-volatility. FeRAM is one of a gr

Explain ISDN Addressing with a example. A sub address, though a part of the ISDN address, is not seems as an integral part of the numbering scheme. Sub-address is carried in a

What are the differences between ASP and ASP .Net ?    1. ASP: Code is Interpreted ASP.NET: Code is Compiled 2. ASP: Business Logic and Presentation Logic are in a one

Q. Define Wait protocol? The wait protocol is used for resolving conflicts that arise due to some multiprocessors requiring same resource. There are 2 kinds of wait protocols: