Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Pipeline Processing
Pipelining is a scheme to realize, overlapped parallelism in the proposed way out of a problem on a digital computer in an economical way. To understand the concept of pipelining, we need to comprehend first the idea of assembly lines in an automated production plant where items are assembled from different parts (phases) and output of one phase/stage becomes the input to other phase. Taking the similarity of assembly lines, pipelining is the method to initiate temporal parallelism in computer operations. Assembly line is the pipeline and the different portions of the assembly line are various phases during which operands of an operation are passed.
To initiate pipelining in a processor P, below steps should be followed:
In this manner, parallelism in a pipelined processor is able to be achieved such that m independent operations can be executed concurrently in 'm' segments as displayed in Figure below.
Figure: m-Segment Pipeline Processor
The stages or segments are applied as pure combinational circuits executing arithmetic and logic operations over the data streams going through the pipe. Latches are used to divide the stages that are fast registers to hold in-between results between the phases as displayed in Figure below. Each phase Si comprises a latch Li and a processing circuit Ci. The final output is stored in output register R. The flow of data from one phase to other is organized by a common clock. So, in every clock period, one phase transfers its results to other phase.
Figure: Pipelined processor
Describe the main factors of switching delay No. The speed of propagation is 200,000 km/sec or 200 meters/µsec. In 10 µsec signal travels 2 km. Therefore, each switch adds equi
What is the disadvantage of a star topology? One major drawbacks of star topology is that once the central hub or switch get damaged, the whole network becomes unusable.
UDP sends packets 'blind' down the network, and relies on upper-layer protocols to form connections and identify errors. TCP is a connection-oriented protocol that can give reliabl
What are the Internal Threats Internal security problems are probably the most common. One never knows what someone is going to do. Even the most loyal employees or workers can
ICMP is used to send error and control messages. Ping uses ICMP to carry the echo-request and echo-reply.
how can u identify the ip class of given ip address
Question 1: ‘There is an overwhelming imperative for organisations to analyse every bit of information they can extract from their huge data warehouses for competitive advant
What is the Catalogue Intranet Intranets of this type are often more accurately described as Extranets. They are designed to give access to a large catalogue of information,
Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)
ATM designers select cells over packets because of the following facts: Cells are fixed length and memory management for them is easy. Handling variable length packets tends
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd