Structural hazards - computer architecture, Computer Engineering

Structural hazards - computer architecture:

A structural hazard takes place when a part of the processor's hardware is required by 2 or more than two instructions at the same time. A structural hazard might take place, for example, if a program were to execute a branch instruction which is followed by a computation instruction. Because they are executed in parallel manner, and because branching is very slow (needing a comparison between program counter-related computation, and writing to registers), it is possible (depending on the architecture) that the both computation and the branch instruction will need the ALU (arithmetic logic unit) at the identical time.

When a machine is pipelined then overlapped execution of instructions needs pipelining of functional units and duplication of resources to permit all possible combinations of instructions in the pipeline.

If some particular combination of instructions can't be accommodated because of a resource conflict, the machine is denoting to have a structural hazard.

Common examples of structural hazards arise when Some functional unit is not completely pipelined. Then a sequence of instructions by using that un pipelined unit can't be proceed ahead at the rate of 1 per clock cycle

 Some resource has not been duplicated adequate to permit all combinations of instructions in the pipeline to execute.

 

 

Posted Date: 10/13/2012 4:14:18 AM | Location : United States







Related Discussions:- Structural hazards - computer architecture, Assignment Help, Ask Question on Structural hazards - computer architecture, Get Answer, Expert's Help, Structural hazards - computer architecture Discussions

Write discussion on Structural hazards - computer architecture
Your posts are moderated
Related Questions
Fail-first - artificial intelligence: Alternatively one such dynamic ordering procedure is known like "fail-first forward checking". In fact the idea is to take advantage of i

Explain that the lost acknowledgement does not necessarily enforce retransmission of the packet . To guarantee reliable transfer, protocols utilize positive acknowledgement al

Explain how a shift register can be used as a ring counter giving the wave forms at the output of the flipflops. Ans: Shift Register as a Ring Counter: A Ring Counter is a

zmax=7.5x1-3x2 subject to constraints 3x1-x2-x3>=3 x1-x2+x3>=2 x1,x2,x3>=0

E ngaged tone is generated in the: (A)  Telephone instrument of calling subscriber (B)  Telephone instrument of called subscriber (C)  Exchange (D)  Repeater

What is structural hazard? Structural hazard is the situation when two instructions needs the use of a given hardware resource at the similar time. The most common case in whic

Define memory cell? A memory cell is capable of storing single bit of information. It is usually organized in the form of an array

MAC address helps in (A)  multimedia access control. (B)  media access control. (C)  mobile access control. (D) master access point control Ans: MAC addr

Problem: (a) Cellular systems are based on two types of multiplexing, what are those two types of multiplexing? Describe how they are used to improve channel allocation in cel

SMTP Simple Mail Transfer Protocol, a protocol for sending e-mail messages among servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from si