Hazard (computer architecture), Computer Engineering

Hazard (computer architecture):

In the computer architecture, a hazard is a possible problem that can occurs in a pipelined processor. It concern to the possibility of erroneous computation when a CPU tries to simultaneously execute multiple instructions which exhibit data dependence. There are typically 3 types of hazards:1) branching hazards 2) structural hazards and  3) data hazards (control hazards).

Instructions in a pipelined processor are executed in various stages, so that at  any given time many instructions are being executed, and instructions cannot be completed in the required order.

A hazard takes place when two or more of these simultaneous (possibly out of order) instructions conflict.

i) Data hazards

a)RAW - Read After Write

b) WAR - Write After Read

c) WAW - Write After Write

ii) Structural hazards

iii) Branch (control) hazards

iv) Eliminating hazards

a)Eliminating data hazards

b) Eliminating branch hazards 

 

Posted Date: 10/13/2012 4:00:55 AM | Location : United States







Related Discussions:- Hazard (computer architecture), Assignment Help, Ask Question on Hazard (computer architecture), Get Answer, Expert's Help, Hazard (computer architecture) Discussions

Write discussion on Hazard (computer architecture)
Your posts are moderated
Related Questions
Any identity or equality in Boolean algebra, suchas de Morgan's Theorem can be proved usingthe method of perfect induction. 1. All combinations of variables are written down.

Advantage to depth first search: It just looks like it will be a long period it finds 'DAN' until. This highlights an important drawback for depth first search. It can regular

how many errors will be left after defect amplification and removal method on the following data design=40 analysis=30 maintenance=20 testing 35 coding 25 take 75% removal efficie

The term addressing mode is a technique of stating the input and output of an instruction; it is termed the effective address. There are 6 effective addresses in the 68HC11 set of

What is write-back or copy-back protocol? For a write operation using this protocol during write-hit: the method is to update only the cache and to mark it as updated with an a

The Chocolate Delights Candy Company requires to add the following functionality to its cash register: When a customer is checking out, the cash register requires keeping the ne

What is the difference between Leave Transaction and Call Transaction? In contrast to LEAVE TO TRANSACTION, the CALL TRANSACTION  statement causes the system to start a new SAP

Your program should print the inverted map to the screen (using a format similar to the inverter project, but you will print out the url values instead of document IDs). You can pr

Determine the types of software There are two types of software today: Application and systems. Meaning of the two changes computer to computer. As we concentrate on large c

Explain the working of Interpreter? The Interpreter is a program that executes instructions written in a high-level language. There are two manners to run programs written in a