Instruction pipeline-level of processing, Computer Engineering

Classification according to level of processing

According to this classification, computer operations are classified as arithmetic operations and instruction implementation. Next, we talk about these classes of this classification:

Instruction Pipeline: As we know that an instruction cycle may consist of several operations like, decode opcode, fetch opcode, compute operand addresses, fetch operands, and implement instructions. These operations of the instruction implementation cycle can be realized by the pipelining concept. Each of these operations forms one phase of a pipeline. The overlapping of implementation of the operations through the pipeline gives a speedup over the common execution. Thus, the pipelines used for instruction cycle operations are called as instruction pipelines.

 

 

Posted Date: 3/2/2013 6:57:59 AM | Location : United States







Related Discussions:- Instruction pipeline-level of processing, Assignment Help, Ask Question on Instruction pipeline-level of processing, Get Answer, Expert's Help, Instruction pipeline-level of processing Discussions

Write discussion on Instruction pipeline-level of processing
Your posts are moderated
Related Questions
Need an help for projects

What is meant by hide area? The hide command temporarily kept the contents of the field at the present line in a system-controlled memory called as the HIDE AREA.  At an intera

What are Parallel Algorithms? The central assumption of the RAM model does not hold for some newer computers that can implement operations concurrently, i.e., in parallel algor

Q. How to Apply Color and Style? 1.  In first text description layout cell, select heading text from the word "Fly" through the word "Mountains." 2.  In Property inspector,

The maximum number of dimensions an array can have in C is C permits arrays of three or more dimensions. The exact limit is examined by the compiler.

A device, usually linked to a serial port of a computer, that transfer data over regular phone lines. Modem stands modulator demodulator; it changes a digital stream of data into s

Illustrate the Encryption and Decryption methods One of the best method of ensuring security is to change the form of communication. Let the messages be encoded in such a patte

As per the JMS specification, when you are in a transaction, the acknowledge Mode is ignored. If acknowledge() is known as within a transaction, it is ignored.

The reason is, LINQ is used with C# or other programming languages, which needs all the variables to be declared first. From clause of LINQ query just describes the range or condit

What is pattern? A pattern is a proven solution to a general problem. Lots of patterns are used. There are patterns for analysis, architecture, design and execution. Patterns c