How a risc cycle is obtained from the von neumann cycle

Assignment Help Computer Engineering
Reference no: EM13940185

Part -1:

Problem 1:

Draw the Von Neumann Cycle and explain the basic function carried out in each state. Explain clearly how a RISC cycle is obtained from the Von Neumann cycle.

Problem 2:

Explain what is done in each of the RISC states for the 5 types of MIPS instructions represented with R, I, and J instruction formats.

Problem 3:

In MIPS, the structure of its instructions is simplified. The way we implement complex instructions through the use of MIPS simplified instructions is to decompose complex instructions into multiple simpler MIPS ones. Show how MIPS can implement the instruction swap $rs, $rt, which swaps the contents of the registers $rs and $rt. Consider the case in which there is an available register that may be destroyed as well as the case in which no register exists.

If the implementation of this instruction in hardware will increase the clock period of a single instruction by 10%, what percentage of swap operations in the instruction mix would justify implementing it in hardware?

Problem 4:

a. Given two n-bit two's complement numbers, prove that an addition overflow occurs if and only if the carry into the most significant bit position and the carry out of the most significant bit position are different.

b. Consider now the sign-magnitude representation. Define the meaning of overflow in this representation and suggest an overflow detection mechanism.

Problem 5:

With x = (0101 0101)2 and y = (1110 1111)2 representing two's complement signed integers, perform the following operations showing all work:

a. x + y

b. x - y

c. x * y

d. x / y

Problem 6:

Given the bit pattern:

1010 1111 1010 1000 0000 0000 0000 1000

what does it represent, assuming that it is:

a. a two's complement integer?

b. an unsigned integer?

c. a single precision IEEE standard floating point number?

d. a MIPS instruction?

Problem 7:

a. Convert the number 752 in base-9 representation into base 3 representation

752nine = ( )three

b. Represent the decimal number -1/3 in IEEE 754 floating-point binary representation (single and double precision) Problem 8 (10 points)

Problem 8:

Consider 2 machines, A and B on which the following measurements are made for a certain program P.

A: Execution time of P: 5 sec

Instructions Executed: 5.4 x 108

CPI: 1.8

B: Execution time of P: 6.4 sec
Instructions executed: 115 x 106

CPI: 2.0

a. Find the execution rate (in Millions of Instructions per Second (MIPS)) for each machine.
b. Find the clock cycle for each machine.
c. Using the book's definition of performance measure, which machine is faster and by how much.

Problem 9:

Assume that a multiply instruction takes 12 cycles and accounts for 15% of the instructions in a typical program. Assume that 85% of the instructions require an average of 4 cycles for each instruction. What percentage of time does the CPU spend doing multiplication?

Problem 10:

Software optimization can dramatically improve the performance of a computer system. Assume that a CPU can perform a multiplication operation in 9ns and an addition or a subtraction in 1ns.

a. How long will it take for the CPU to calculate the result of following equation assuming that we only have 1 multiplier and 1 adder?

b. If possible, optimize the equation so that it takes less time. What is the best-case running time for the calculation of the equation? What if we have 2 multipliers and 1 adder?

Bonus Problem:

Provide the pseudocode for the addition of two natural numbers using only increment, decrement, and conditional looping instructions.

Reference no: EM13940185

Questions Cloud

What is the annualized forward premium : The one-year forward rate of the British pound is quoted at $1.60, and the spot rate of the British pound is quoted at $1.63. What is the annualized forward premium or discount of the pound? You are a speculator who sells a put option on Canadian dol..
Explain getters and setters in java : A constructor will allow a name and a new, validated subject code to be provided when a new subject is created.
Compare organizational structures of correctional agencies : Criminal justice organizations are structured differently based upon the mission of the organization. Compare and contrast the organizational structures of correctional agencies, law enforcement agencies, and courts.
Invest using discount brokers : Many young professionals choose to invest using discount brokers. Give two reasons why you might follow their lead. Also, list two reasons why using a discount broker may not be the best choice.
How a risc cycle is obtained from the von neumann cycle : Draw the Von Neumann Cycle and explain the basic function carried out in each state. Explain clearly how a RISC cycle is obtained from the Von Neumann cycle.
Invested in twelve different stocks that have combined value : Steve has invested in twelve different stocks that have a combined value today of $121,300. Fifteen percent of that total is invested in Wise Man Foods. The 15 percent is a measure of which one of the following?
Annualized annual payment over the term of the loan : Due to new air pollution standards, a company needs to invest in a new $150,000 environmental control technology. They have two options: either take out a loan or to purchase it themselves. a) If the company chooses to borrow the $150,000 from a bank..
Estimate the probability that the exchange rate : An exchange rate is currently $1.20. The volatility of the exchange rate is quoted as 15% and interest rates in the two countries are the same. Using the lognormal assumption, estimate the probability that the exchange rate in six months will be (a) ..
Counterfeit goods with counterfeiters : Introduction "Counterfeiting is said to be the crime of the 21st century." (Cademan, A & Henriksson, R & Nyqvist, V. (2012). The luxury brand market is highly associated with counterfeit goods with counterfeiters attempting to replicate many big n..

Reviews

Write a Review

Computer Engineering Questions & Answers

  The course project will involve producing a professional

the objective of the project is to recommend an upgraded wireless technology for a major telecommunication carrier.

  Utilizing the rsa protocol encrypt and decrypt messages

You are asked to hand-turn the RSA protocol in order to encrypt and decrypt the messages (utilizing smaller numbers than are used in the practice, so that calculations may be done through the hand).

  Context free language

Let L1 be the regular language and L2 be the context-free language, both described over the same alphabet Σ. a) Is L1∩L2 always regular? Explain your claim.

  There are many ways to render an object

There are many ways to render an object and the choice depends on the use the work will be put to.

  Question1 what three things most an attacker have and why

question1. what three things most an attacker have and why with reason?2. describe disparity between a vulnerability

  Reasons to incorporate the venturing

Explain how are corporate ventures differentiated from other projects within the large organizations and from the entrepreneurial start-ups? List some of the reasons which incorporate the venturing has had a relatively poor track record?

  Make an idef1x e-r diagram

The scenario is that the Public Affairs Office at Highline University receives requests for speakers on particular topics. To be capable to respond to such request, that office wants to build a database.

  Assume that we have these 6 samples 1000 1001 1010 1005

question suppose we have these 6 samples 1000 1001 1010 1005 1006 1002. consider the compression scheme from lecture

  Recoginizing the error in given code

Identify the problem in the above code, If ( toupper( response[ 0 ] ) == 'Y' )

  Select one of the social media tools noted above and

select one of the social media tools noted above and explain how this application can be used to collect data from

  Regulating the content of internet

Specify to what extent there should be regulation of the content on the Internet, if at all? State the factors and principles the federal government must take into account when considering the indecency regulation issues.

  You are the information security officer at a medium-sized

you are the information security officer at a medium-sized company. the cio asks you to explain why you believe it is

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd