How many reservation stations are required for the system

Assignment Help Basic Computer Science
Reference no: EM131251704

Suppose that a superscalar version of our 5-stage MIPS pipeline system contains the following functional units: 1 load/store unit, 1 branch unit, 2 integer units and 2 floating point units. The following instruction sequence is to be executed on this system:

lui $5,0x1234

addiu $5,$5,0x22

sw $5,0x4800($2)

sub $11,$4,$7

sltu $3,$9,$10

sll $12,$14,2

a) To avoid stalls, what is the maximum number of entrys required for a centralized instruction window to handle this instruction sequence?

b) If reservation stations are used instead of an instruction window, how many reservation stations are required for the system?

Reference no: EM131251704

Questions Cloud

Temperature reading separating the bottom : Find P22, the 22-percentile. This is the temperature reading separating the bottom 22% from the top 78%.
Solve the game by backward induction and report the strategy : Solve the game by backward induction and report the strategy profile that results. -  How many proper subgames does this game have?
Describe the strategies for termination of case management : Write a 700- to 1,050-word paper in which you describe the strategies for termination of case management. Identify how independent care will help in continued client growth.
What are the primary functions of the fed : The monetary system in any economy facilitates trade and allows people to trade more efficiently, as compared to a barter economy. What are the primary functions of the Fed? What role does the Federal Open Market Committee (FOMC) play in our economy
How many reservation stations are required for the system : To avoid stalls, what is the maximum number of entrys required for a centralized instruction window to handle this instruction sequence?
Explain role special interest groups play in their effort : Explain the role special interest groups play in their effort to influence legislation that dictates reentry and rehabilitation policy. Then from a macro perspective, should there be so many access points that allow special interest groups to acc..
Prepare a strong thesis for your essay : Create a strong thesis for your essay. A thesis states your main idea in a sentence. A sample thesis might be: Toni Morrison and Alice Walker are both award-winning authors that share a similar theme.
Which of the statements is true concerning subquery : Which of the following statements is true concerning subqueries?
Examination of the recommendations of the author : A brief description of your Final Paper and how the journal article will support your research. An explanation of the basic premises of the author. An examination of the recommendations of the author.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Assistance in creating an entity relationship design

Assistance in creating an entity relationship design that captures/tracks information of researchers within all universities in a given state. Information of interest includes researcher name, title, position; university name, location, enroll..

  Play cards in a computer system

Describe the meaning and the use of plug and play cards in a computer system?

  What is the surface area of the heat exchanger

A cross-flow heat exchanger used in a cardiopulmonary bypass procedure cools blood flowing at 5 liter/min from a body temperature of 37°C to 25°C in order to induce body hypothermia, which reduces metabolic and oxygen requirements.

  What is the maindifference between the fms attack

What is the maindifference between the FMS attack and Chopchop attack? Clearly explain youranswer in 600 words.

  Find the solution for the given initail value problem

find the solution for the given initail value problem y'' + 2y'+5y=4e^-t cos2t, y(0)=1, y'(0)=0:

  Briefly describe the threat

This assignment provides you with an opportunity to read an article about a current security threat (or attack) while also examining how security measures impact the customer experience.

  Compute a min hash value using hash function

Suppose data is in a file that is distributed over many processors. Show how you would use the map-reduce framework of Section 20.2 to compute a min hash value, using a single hash function,

  Priority queue

Write a program that shows what happens when random values go first through an ordinary queue and then through a priority queue. The Queue interface specifies add and remove methods that add elements to and remove elements from a queue.

  What is the present worth of the savings

what is the present worth of the savings (in $/acre-ft) to the utility between the old and the new contracts? Let the interest rate equal 6% per year.

  Fibonacci sequence in the child process

Write a C program that generates the Fibonacci sequence in the child process. The number of the sequence will be provided in the command line. For example if 10 is provided, the Fibonacci numbers less than 10 will be output by the child process

  Putting in more effort than a coworker

According to equity theory, what might happen if a worker thought he or she was putting in more effort than a coworker, yet the coworker received a higher salary or larger bonus?

  What specific data about the entities will need to be stored

Create the following diagrams: a context diagram a workflow diagram an activity diagram a sequence diagram.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd