Assignment on processor performance & pipeline

Assignment Help Computer Networking
Reference no: EM13756782

Processor Performance & Pipeline

Exercise 1

We wish to compare two systems S1 and S2. The table below presents measurements for the two systems when running two programs, Program 1 and Program 2.

 

System 1

System 2

Program

ExT (sec)

IC

ExT (sec)

IC

1

6

12x106

8

10x106

2

10

 

6

 

1. If the clock rate of system S1 is 4 MHz and the clock rate for system S2 is 6 MHz, find CPI For each system when running Program 1

CPI for S1 = ______________

CPI for S2 = ______________

2. Assuming the CPI for each system when running Program 2 is the same as it is when running Program 1, find the instruction count (IC) for each system when running Program 2

IC for S1 = ______________

IC for S2 = ______________

Exercise 2

Consider a pipelined execution of the following program segment in which the instruction labeled "Beg" starts at memory address (2040)10. All registers used contain 0 initially.

 

Beg:

add

$8, $9, $10

 

 

 

beq

$5, $6, Nex

 

 

 

lw

$7, 30($13)

 

 

 

sw

$14, 48($15)

 

 

Nex :

nand

$11, $12, $13

 

1. Show the state of the 5-stage pipeline similar to that of Example 5.16-a) on P. 206 for the instructions above.

2. Assume the time for stages is 100ps for register read or write, and 200ps for other stages. Compute the total time required for each of the instructions used in the program segment above.

3. Compare the total execution time for non-pipelined and pipelined execution of the above program segment:

Non-pipeline design = ______________ ps

Pipelined design = ______________ ps

_________________ design is _________ times faster

Reference no: EM13756782

Questions Cloud

An effective interest rate : At an effective interest rate of 12%, a single sum invested today will double itself in how many years? 6,8,12, or insufficient. please show work
Determine how you would evaluate marketing plans : In the role of marketing director for a company that plans to expand into international markets, determine how you would evaluate marketing plans to launch a newly developed environmentally friendly minicar.
How increase use of technology lead to poor quality data : Healthcare Electronic Medical record systems-How does increase use of technology lead to poor quality data
A down payment on a house : Betty has saved $60,000 for a down payment on a house. She is now actively looking for her dream house and anticipates making an offer on a home with the next two months. If the offer is accepted, it will take up to three additional months to close o..
Assignment on processor performance & pipeline : We wish to compare two systems S1 and S2. The table below presents measurements for the two systems when running two programs, Program 1 and Program 2.
What price should this bond trade today : A Ford Motor Co. coupon bond has a coupon rate of 6.55%, and pays annual coupons. The next coupon is due tomorrow and the bond matures 36 years from tomorrow. The yield on the bond issue is 6.25%. At what price should this bond trade today, assuming ..
Write paper on android fragmentation-burden or benefit : Write paper on Android Fragmentation: Burden or Benefit
What is the contribution margin ratio-variable expense ratio : What is the contribution margin per unit? What is the contribution margin ratio? What is the variable expense ratio? If sales increase to 1,001 units, what would be the increase in net operating income?
Security mechanisms needed to protect the dms systems : Analyze the security mechanisms needed to protect the DMS systems from both state employees and users accessing over the Internet

Reviews

Write a Review

Computer Networking Questions & Answers

  Aalyze the security mechanisms needed to protect the dms

write a three to four 3-4 page paper in which you analyze the security mechanisms needed to protect the dms systems

  Software development methods comprise joint application

software development methods include joint application development jad rapid application development rad extreme

  Compute time taken by signal to reach from one node to other

Assume nodes A and Bare on the same 10 Mbps Ethernet bus, and the propagation delay between the two nodes is 325 bit times. The answer is no, if B 's signal reaches A before bit time t = 512 + 64 bits. In the worst case, when does B's signal reach A?

  Compute maximum throughput rate-host can achieve in network

Consider a 100mbps token ring network with 10 stations having a ring latency of 50¹s. Calculate the maximum throughput rate that one host can achieve in the network.

  Create a network design for a fictitious organization and

create a network design for a fictitious organization. each week you will be completing a part of the assignment based

  Foundation in developing the network design

The Fiction CEO has informed you that the capital budget for this migration cannot exceed $500,000 and must not interrupt business operations. What follows is a brief background that will serve as your foundation in developing the network design.

  What frames are in sender-s window range

Then the sender learns of acknowledgment of 0,1,2,5. What frames are in sender's window range just after this event?

  1 discuss the influence of rationalism in politics and how

1. discuss the influence of rationalism in politics and how it impacts the publics view of government services.2.

  You can are required to research into one of the

you can are required to research into one of the following topics on data security or computer-network security and

  Write a three-page summary a successful penetration test

Using MS Word, write a three-page summary describing a successful penetration test. What penetration tools and techniques do you feel would be needed in a successful penetration test?

  Create a diagram showing the overall network

Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you've designed from the user or endpoint device to the Internet cloud

  Use the internet to choose four usb drives which support

use the internet to select four usb drives that support hardware encryption. create a table that compares all four and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd