Basic tradeoff of concerns for instruction set design, Computer Engineering

Assignment Help:

Q. Basic Tradeoff of concerns for instruction set design?

Basic Tradeoff: Smaller instruction (less space) vs. desire for more powerful instruction repertoire.

Generally programmer desire:

  • More operands andop-code: as it results in smaller programs
  • More addressing modes: for greater flexibility in implementing functions such as multiple branching,table manipulations.

Though a 32 bit instruction however will occupy double the space and can be fetched at double the rate of a 16 bit instruction thoughcan't be doubly useful. 

Factors which are must to be considered for deciding about instruction length:

  • Memory size: if larger memory range is to be addressed then more bits can be needed in address field.
  • Memory organization: if addressed memory is virtual memory then memory range that is to be addressed by instruction is larger than physical memory size.
  • Memory transfer length: Instruction length mustgenerally be equal to data bus length or multiple of it.
  • Memory transfer: Data transfer rate from memory preferablymust be equivalent to processor speed. It may become a bottleneck if processor executes instructions faster than rate of fetching the instructions. One solution for this problem is to use cache memory or another solution can be to keep instruction short.

Generally an instruction length is kept as a multiple of length of a character (which is 8 bits), and equal to length of fixed-point number. The term word is commonly used in this context. Generally the word size is equal to length of fixed point number or equal to memory-transfer size. Additionally a word must store integral number of characters. So word size of 16 bit, 32 bit, 64 bit are to be coming very common and henceforth the similar length of instructions are normally being used.


Related Discussions:- Basic tradeoff of concerns for instruction set design

Explain congestion, Explain CONGESTION. CONGESTION: This is uneconomi...

Explain CONGESTION. CONGESTION: This is uneconomic to provide sufficient equipment to carry entire traffic that could possibly be given to a telecommunication system. Inside

Determine reduced boolean equation and the karnaugh map, Determine reduced ...

Determine reduced Boolean equation and the Karnaugh Map? Illustration : Determine reduced Boolean equation and the Karnaugh Map for the truth table shown below:

Micro processor code, Suppose that the working register W contains the valu...

Suppose that the working register W contains the value 0x4F, the register FSR contains the value 0x2B; the register with address 0x2B contains 0x2F and the instruction ADDWF INDF,

Explain topology method used in lan technology in detail, Explain topology ...

Explain topology method used in LAN technology in detail. LAN Topologies: Network topology is a physical schematic that shows interconnection of the various users. There are

Write an html program segment that contains hypertext links, Write an HTML ...

Write an HTML program segment that contains hypertext links from one document to another . HTML permits any item to be placed as a hypertext reference. Therefore a single word

What is full trust, What is Full Trust? Your code is permitted to do an...

What is Full Trust? Your code is permitted to do anything in the framework, meaning that all (.Net) permissions are granted. The GAC has Full Trust because it's on the local HD

Register-to-register operands in RISC, Q. Register-to-register operands in ...

Q. Register-to-register operands in RISC? Register-to-register operands: In RISC machines operation which access memories are LOAD and STORE. All other operands are kept in reg

Determine the process of kernel, What are the events done by the Kernel aft...

What are the events done by the Kernel after a process is being swapped out from the main memory? When Kernel changes the process out of the primary memory, it performs the fol

Write shorts notes on sliding window protocol, Write shorts notes on Slidin...

Write shorts notes on Sliding Window Protocol To acquire high throughput rates, protocols employ a flow control technique termed as sliding window. Both, the sender and receive

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd