Explain what are the different hazards, Computer Engineering

There are situations, called hazards that stop the next instruction in the instruction stream from implementing during its designated clock cycle. Hazards decrease the performance from the ideal speedup gained by pipelining. There are three classes of Hazards:

1. Structural Hazards: It happens from resource conflicts when the hardware cannot support all possible combinations of instructions simultaneously in overlapped implementation.

2. Data Hazards: It happens when an instruction depends on the results of last instruction in a way that is exposed by the overlapping of instructions in the pipeline.

3. Control Hazards: It happens from the pipelining of branches and other instructions that change the PC.

 

 

Posted Date: 4/6/2013 2:11:31 AM | Location : United States







Related Discussions:- Explain what are the different hazards, Assignment Help, Ask Question on Explain what are the different hazards, Get Answer, Expert's Help, Explain what are the different hazards Discussions

Write discussion on Explain what are the different hazards
Your posts are moderated
Related Questions
Q. Describe target processor arrangements? Having seen how to describe one or more target processor arrangements we need to initiate mechanisms for distributing data arrays ove

Evolutionary approaches boil down - artificial intelligence: In fact as we will see whether evolutionary approaches boil down to like (i) just to identify how to represent pos

Which of the memories stores the most number of bits ? Ans. most number of bits stores in 32M x 8 As 2 5 x 2 20   = 2 25 Therefore 1M = 2 20 = 1K x 1K = 2 10 x 2 10

Explain about Flip-Flops  Flip-Flops are also called bistable multivibrator.  A flip-flop is capable of storing 1 bit of binary data.  It has two stable states- 'one' and 'zero

Explain the statement- CRT screen as a two-dimensional matrix One can imagine the CRT screen as a two-dimensional matrix which has m rows and n  columns and this is usually ref

Retina - Biometric Computer Security Systems The next security technology that explained in this report is retina security technology which is very famous in a lot of spy movi

How would you implement inheritance using VB.NET/C#? When we set out to execute a class using inheritance, we must first start with an existing class from which we will derive

Define Hit ratio. The performance of cache memory is frequently measured in terms of quantity called hit ratio. Hit-Find a word in cache. Miss-Word is not found in cache.

Problem: (a) Cellular systems are based on two types of multiplexing, what are those two types of multiplexing? Describe how they are used to improve channel allocation in cel

Discuss briefly subscriber loop system. Subscriber Loop System: Every subscriber in a telephone network is connected usually to the nearest switching office using a dedicated