Explain pipeline processing, Computer Networking

Assignment Help:

Pipeline Processing

Pipelining is a scheme to realize, overlapped parallelism in the proposed way out of a problem on a digital computer in an economical way. To understand the concept of pipelining, we need to comprehend first the idea of assembly lines in an automated production plant where items are assembled from different parts (phases) and output of one phase/stage becomes the input to other phase. Taking the similarity of assembly lines, pipelining is the method to initiate temporal parallelism in computer operations. Assembly line is the pipeline and the different portions of the assembly line are various phases during which operands of an operation are passed.

To initiate pipelining in a processor P, below steps should be followed:

  • Subdivide the input process into a series of subtasks. These subtasks will create phases of pipeline that are also called segments.
  • Every stage Si of the pipeline according to subtask would execute a number of operations on a different set of operands.
  • When stage Si has finished its operation, results are passed to the subsequent stage Si+1 for next operation.
  • The stage Si receives a new set of input from earlier stage Si-1.

In this manner, parallelism in a pipelined processor is able to be achieved such that m independent operations can be executed concurrently in 'm' segments as displayed in Figure below.

2419_Pipeline Processing.png

Figure: m-Segment Pipeline Processor

The stages or segments are applied as pure combinational circuits executing arithmetic and logic operations over the data streams going through the pipe. Latches are used to divide the stages that are fast registers to hold in-between results between the phases as displayed in Figure below. Each phase Si comprises a latch Li and a processing circuit Ci. The final output is stored in output register R. The flow of data from one phase to other is organized by a common clock. So, in every clock period, one phase transfers its results to other phase.

     2166_Pipeline Processing 1.png

Figure: Pipelined processor


Related Discussions:- Explain pipeline processing

Describe the main factors of switching delay, Describe the main factors of ...

Describe the main factors of switching delay No. The speed of propagation is 200,000 km/sec or 200 meters/µsec. In 10 µsec signal travels 2 km. Therefore, each switch adds equi

What is the disadvantage of a star topology, What is the disadvantage of a ...

What is the disadvantage of a star topology? One major drawbacks of star topology is that once the central hub or switch get damaged, the whole network becomes unusable.

Characteristics of udp, UDP sends packets 'blind' down the network, and rel...

UDP sends packets 'blind' down the network, and relies on upper-layer protocols to form connections and identify errors. TCP is a connection-oriented protocol that can give reliabl

What are the internal threats - security, What are the Internal Threats ...

What are the Internal Threats Internal security problems are probably the most common. One never knows what someone is going to do. Even the most loyal employees or workers can

Recognize the purpose of icmp, ICMP is used to send error and control messa...

ICMP is used to send error and control messages. Ping uses ICMP to carry the echo-request and echo-reply.

Ip address, how can u identify the ip class of given ip address

how can u identify the ip class of given ip address

Describe the datawarehouse and data mining, Question 1: ‘There is an ov...

Question 1: ‘There is an overwhelming imperative for organisations to analyse every bit of information they can extract from their huge data warehouses for competitive advant

What is the catalogue intranet, What is the Catalogue Intranet Intra...

What is the Catalogue Intranet Intranets of this type are often more accurately described as Extranets. They are designed to give access to a large catalogue of information,

Show the model for network access security, Q. Show the Model for Network A...

Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)

Cells vs packets, ATM designers select cells over packets because of the fo...

ATM designers select cells over packets because of the following facts: Cells are fixed length and memory management for them is easy. Handling variable length packets tends

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd