Explain pipeline processing, Computer Networking

Assignment Help:

Pipeline Processing

Pipelining is a scheme to realize, overlapped parallelism in the proposed way out of a problem on a digital computer in an economical way. To understand the concept of pipelining, we need to comprehend first the idea of assembly lines in an automated production plant where items are assembled from different parts (phases) and output of one phase/stage becomes the input to other phase. Taking the similarity of assembly lines, pipelining is the method to initiate temporal parallelism in computer operations. Assembly line is the pipeline and the different portions of the assembly line are various phases during which operands of an operation are passed.

To initiate pipelining in a processor P, below steps should be followed:

  • Subdivide the input process into a series of subtasks. These subtasks will create phases of pipeline that are also called segments.
  • Every stage Si of the pipeline according to subtask would execute a number of operations on a different set of operands.
  • When stage Si has finished its operation, results are passed to the subsequent stage Si+1 for next operation.
  • The stage Si receives a new set of input from earlier stage Si-1.

In this manner, parallelism in a pipelined processor is able to be achieved such that m independent operations can be executed concurrently in 'm' segments as displayed in Figure below.

2419_Pipeline Processing.png

Figure: m-Segment Pipeline Processor

The stages or segments are applied as pure combinational circuits executing arithmetic and logic operations over the data streams going through the pipe. Latches are used to divide the stages that are fast registers to hold in-between results between the phases as displayed in Figure below. Each phase Si comprises a latch Li and a processing circuit Ci. The final output is stored in output register R. The flow of data from one phase to other is organized by a common clock. So, in every clock period, one phase transfers its results to other phase.

     2166_Pipeline Processing 1.png

Figure: Pipelined processor


Related Discussions:- Explain pipeline processing

Length- transport layer, Length This is a 16 bit  field  that  defines...

Length This is a 16 bit  field  that  defines  the total  length  of the user  datagram, header  plus data. This 16 bit  can define  a total  length  of a 0 to 65, 535 bytes.

Firewalls, Firewalls Firewalls emerged as a new technology in 1990s but...

Firewalls Firewalls emerged as a new technology in 1990s but its idea was present near two decades back. Historical context of "Firewall" is quite literal. It was in use to des

Local loop portion of the service starts, What is the juncture at which the...

What is the juncture at which the CPE ends and the local loop portion of the service starts?  Ans) The demarcation or demarc is the juncture at which the CPE ends and the local

Two routers running igrp to communicate their routes, What must be true for...

What must be true for two Routers running IGRP to communicate their routes? Ans) Similar autonomous system number

What is the internal ip address, What is the internal IP address There ...

What is the internal IP address There is a separate set of IP address for a company's internal use, more popularly known as "internal IP address" or subnet IP address. This IP

Illustrate the products based on socks protocol, Illustrate the products ba...

Illustrate the products based on Socks protocol There are a number of products based on SOCKS specifications such as Auto SOCKS available in the market. The latest version is S

Distinguish cisc and risc, Question 1 Distinguish CISC and RISC Question ...

Question 1 Distinguish CISC and RISC Question 2 Write a short note on Asynchronous Transfer Mode of transmission Question 3 Explain various client/server applications using Ja

Types of ospf configuration, Name the types of OSPF Configuration? Ans) ...

Name the types of OSPF Configuration? Ans) There are Two Types of OSPF configuration A ) SINGLE AREA b) MULTI AREA

Security - fundamentals of networks, Security Security  is the  protec...

Security Security  is the  protection of hardware software and data  from  unauthorized access. Restricted physical  access to computer password protection limiting  user priv

What is OSPF, What is OSPF? It is an Internet routing protocol that scal...

What is OSPF? It is an Internet routing protocol that scales well, can route traffic with multiple paths, and uses knowledge of an Internet's topology to make precise routing de

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd