Exdplain instruction buffers, Computer Engineering

Instruction buffers

For taking the complete advantage of pipelining pipelines must be filled continuously. So instruction fetch rate must be matched with pipeline consumption rate. To accomplish this instruction buffers are used. Instruction buffers in CPU have high speed memory for accumulating the instructions. The instructions are prefetched in buffer from main memory. Alternative for the instruction buffer is cache memory between main memory and CPU. The benefit of cache memory is it can be used for both data and instruction however cache needs more complicated control logic than instruction buffer.  Some pipelined computers have implemented both.


Posted Date: 7/13/2013 2:04:49 AM | Location : United States

Related Discussions:- Exdplain instruction buffers, Assignment Help, Ask Question on Exdplain instruction buffers, Get Answer, Expert's Help, Exdplain instruction buffers Discussions

Write discussion on Exdplain instruction buffers
Your posts are moderated
Related Questions
In this model a one process can have multiple, concurrent implementations paths. The major programs are scheduled to run by the native operating system. It loads and obtains all th

The typicality of virtual addresses is that: They are longer than physical addresses because total addressed memory in virtual memory is more than actual physical memory.

What is the 2's complement of the number 1101101 ? Ans. 0010011 is the 2's complement of the number 1101101. As 1's complement of the number 1101101 is 0010010 and 2's comple

What are the main differences between OSI and TCP/ IP reference models? Explain briefly. We will be considering only on the key differences among the two references models. Th

Write Relational algebra expressions for the given queries. (i) List the employee numbers, employee names and their manager numbers working in several branches who earn more than

CIDR stands for? CIDR stands here for Classless Inter Domain Routing.

How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to

Give example of stack using encapsulation of OOA An example of the Stack.  A Stack abstraction provides methods like pop (), push (), isEmpty(), isFull(). The Stack can be i

What is computer virus?  A  computer  virus  is  a  computer  program  that  is  designed  to  spread  itself between   computers.   Computer virus are inactive when standing a

What Component of LoadRunner would you use to record a Script? Ans) The Virtual User Generator (VuGen) component is used to record a script. It enables you to make Vuser scripts