Structural hazards - computer architecture, Computer Engineering

Structural hazards - computer architecture:

A structural hazard takes place when a part of the processor's hardware is required by 2 or more than two instructions at the same time. A structural hazard might take place, for example, if a program were to execute a branch instruction which is followed by a computation instruction. Because they are executed in parallel manner, and because branching is very slow (needing a comparison between program counter-related computation, and writing to registers), it is possible (depending on the architecture) that the both computation and the branch instruction will need the ALU (arithmetic logic unit) at the identical time.

When a machine is pipelined then overlapped execution of instructions needs pipelining of functional units and duplication of resources to permit all possible combinations of instructions in the pipeline.

If some particular combination of instructions can't be accommodated because of a resource conflict, the machine is denoting to have a structural hazard.

Common examples of structural hazards arise when Some functional unit is not completely pipelined. Then a sequence of instructions by using that un pipelined unit can't be proceed ahead at the rate of 1 per clock cycle

 Some resource has not been duplicated adequate to permit all combinations of instructions in the pipeline to execute.

 

 

Posted Date: 10/13/2012 4:14:18 AM | Location : United States







Related Discussions:- Structural hazards - computer architecture, Assignment Help, Ask Question on Structural hazards - computer architecture, Get Answer, Expert's Help, Structural hazards - computer architecture Discussions

Write discussion on Structural hazards - computer architecture
Your posts are moderated
Related Questions
Q. Environment of the Packet Flow? Protocol stack used on Internet is referred to as TCP/IP protocol stack. If we were to follow the path that message "Hello computer 5.6.7.8!"

INSERT OPERATION The insert operation inserts a new value into a set of bits. This is done by first masking bits and then O ring them with required value. For illustration, sup

Q. Describe THEAD, TBODY and TFOOT tag? THEAD, TBODY, TFOOT , , and form groups of rows. specifies that a group of rows are heade

The hexadecimal number for (95.5) 10 is ? Ans. (95.5) 10 = (5F.8) 16 Integer part Fractional part 0.5x16=8.0

Conversion of Decimal Number to Binary Number: For converting a decimal number to binary integer part and fractional part are handled separately. Let's describe it with help of

In general what are the two ways in which one can retrieve data from tables? Using Select statements, Database Program.

Explain The Storage Class auto The Storage Class auto : Variables declared within function bodies are automatic by default. Thus, automatic is the most common of the four stora

Higher Order Predicate Logic : In the very first order predicate logic, we are only allowed to quantify over objects. If we are considered to allow ourselves to quantify over

Intranets are mainly "small" Internets. They use same network facilities that Internet does, though access is restricted to a limited sphere. For example, a company can set up an i

Explain the various interface circuits.  An I/O interface having of circuitry required to connect an I/O device to computer bus. One side having of a data path with its associa