Implement a different version of the mml isa

Assignment Help Basic Computer Science
Reference no: EM13936277

ct Description

In this project you will design the multi-cycle datapath for the modified MIPS-Lite (MML) ISA from homework #2 (and summarized below). You will model and verify your design using the Verilog Hardware Description Language (HDL).

** Note that with permission, you can implement a different version of the MML ISA if you can justify why your solution to homework #2 is better than the proposed solution.

The project involves seven major steps (note, steps 3 - 5 can be done concurrently):

Step 1. Design instruction formats for the MML ISA (Done in homework #2 and summarized below).

Step 2. Design the multi-cycle datapath for the MML ISA and the Main Controller's Finite State Machine
Step 3. Write Verilog HDL models of the multi-cycle datapath components (as described below). Individually test each component (module).
Step 4. Design and model the main controller and ALU controller and test.

Step 5. Write a MML ISA machine code benchmark to fully test the integrated datapath design.
Step 6. Integrate the components to build the complete multi-cycle datapath. Test your design using the benchmark designed in step 5.
Step 7. Write your project report describing all aspects of the design from steps 1 through 6. Your report should be technical and comprehensive.
MML ISA
The MML ISA is a load-store architecture with the following specifications,

• 8 registers, where register 0 is always zero.
• A 16-bit word.
• Byte addressable memory.
• A one-word instruction with the 4 following instruction formats:

R-format [opcode = 5 bits][rs = 3 bits][rt = 3 bits][rd = 3 bits][func = 2 bits]
I-format [opcode = 5 bits][rs = 3 bits][rt = 3 bits][immediate = 5 bits]
IL-format [opcode = 5bits][rs = 3 bits][immediate = 8 bits]
J-format [opcode = 5 bits][address = 11 bits]
• Six addressing modes:
o Immediate addressing:
addiu $1,$2, imm # $1 = $2 + 5-bit immediate deskPD

Reference no: EM13936277

Questions Cloud

Project to further develop your understanding of forensics : Snapchat is a popular mobile photo messaging app developed by Stanford University students. The app facilitates users to send and receive videos and photos to other users of the app on their friends list.
Examine and critically comment on reason for the change rate : Then examine and critically comment on the reasons for the change in the exchange rate as given in the financial press.
Find scm or operations management positions from job site : find two SCM or operations management positions from job site such as Monster com or Salary com and some information about them. starting salary, job skills, expectations, e.g. Write a paragraph about each position again, in your own words)
How might diversity impact individual attitudes and behavior : What are the challenges in managing a diverse age group of employees? How might diversity impact individual attitudes and behavior
Implement a different version of the mml isa : In this project you will design the multi-cycle datapath for the modified MIPS-Lite (MML) ISA from homework #2 (and summarized below). You will model and verify your design using the Verilog Hardware Description Language (HDL).
Why a central bank may wish to weaken value of its currency : Briefly explain why a central bank may wish to weaken the value of its currency. Explain why it would be difficult to maintain a fixed exchange rate between the euro and the dollar.
Operations and location of entity : RATIO ANALYSIS AND COMPARATIVE TO INDUSTRY AVERAGES - COMPETITIVENESS - RATIO ANALYSIS AND COMPARATIVE TO INDUSTRY AVERAGES
Modern machines consist of multiple levels : Explain why modern machines consist of multiple levels of virtual machines. Why not just have two levels, the digital logic level and the high-language programming level?
Describe the effects of the sugar quota : Describe the effects of the sugar quota. In 2005, imports were limited to 5.3 billion pounds, which pushed the domestic price to 27 cents per pound. Suppose imports were expanded to 10 billion pounds. What would be the new U.S. domestic price? How mu..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Implement list methods retrieve and remove use exceptions

Implement the list methods retrieve and remove to use exceptions.

  Explain the importance of business rules in database design

How would you explain the importance of business rules in database design? What tables would you create, and what would be the entity names and attribute names? What are the business rules that must be considered in this design?

  Describing targeted audience go for particular site

Recognize a particular website that you frequently go to and explain targeted audience that goes to that particular site. Do not say "everyone" since all sites always have general target audience.

  Arrays for computer science

Initialize the array with the appropriate number of values.

  Your first program will require the use of static methods

Your first program will require the use of static methods and for loops

  Critical infrastructure protection

Critical Infrastructure ProtectionAccording to the text, Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure.

  Documentation sheet author-purpose

Data imported from SalesData.csv text file located in Course Project Materials in DocSharing. Professional formatting follows the formatting guidelines. Documentation sheet added to provide author, purpose, and date and provide information about e..

  What is the probability of receiving 4 messages such that

Assume that the probability of a received message having an error is 0.10 (errors are independent). What is the probability of receiving 5 good (that is, error free) messages? What is the probability of receiving 4 messages such that 1 or more messag..

  What is e-waste

1. What is e-waste? What is so dangerous about e-waste? Many well-meaning individuals thought that recycling was the answer to the e-waste problem. But why hasn't e-waste recycling yielded the results hoped for?

  Shoppingbay is an online auction service

ShoppingBay is an online auction service that requires several reports. Design a flowchart or psuedocode [this is changed to Java program, since this is an old assignment we're doing for practice in Java] for the following: a. A program..

  Recognize the specific manufacture and model of one 1

identify the specific manufacture and model of one 1 magnetic disk one 1 solid state drive and one 1 optical drive.

  Methods for information systems can become vulnerable

While word weakness seems to define it pretty well, there are a number of mthods that information systems can become vulnerable.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd