Explain the classification according to level of processing, Computer Networking

Assignment Help:

Classification according to level of processing

According to this categorization computer operations are classified like arithmetic operations and instruction execution. Subsequently we discuss below classes of this categorizations:

  • Instruction Pipeline: We know that an instruction cycle can comprise several operations such as decode opcode, fetch opcode, compute operand addresses, execute instructions, and fetch operands. These operations of instruction execution cycle may be realized by pipelining concept. Every of these operations represent one stage/phase of a pipeline. The overlapping of execution of operations via the pipeline offers a speedup over normal execution. So the pipelines used for instruction cycle operations are called instruction pipelines.
  • Arithmetic Pipeline: The complex arithmetic operation such as floating point and multiplication operations takes much of the time of ALU. These operations can too be pipelined by sectioning the operations of ALU and as a result high speed performance can be achieved. So the pipelines used for arithmetic functions are called as arithmetic pipelines.

 


Related Discussions:- Explain the classification according to level of processing

Routing protocol used in design a banking network, You have been asked to d...

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

Low frequency cut-off of the band-pass, Question Approximately what is ...

Question Approximately what is the low frequency cut-off of the band-pass filter shown in the figure?

Disadvantages - point to point , Disadvantages You typically  would  no...

Disadvantages You typically  would  not use a packet filter  as your  only security solution for your network  packets filters have two  major  disadvantages. a. Low securit

Explain asynchronous FDDI, Explain Asynchronous FDDI Asynchronous bandw...

Explain Asynchronous FDDI Asynchronous bandwidth is allocated utilizing an eight-level priority scheme. Every station is assigned an asynchronous priority level. FDDI as wel

Master construct program in parallel construct, master construct #incl...

master construct #include extern float average(float,float,float); void master_construct ( float* x, float* xold, int n, float tol )  { int c, i, toobig; floa

Which decision called socket base, IP plus port (IP on layer 3 and port on ...

IP plus port (IP on layer 3 and port on Layer 4 - In Encapsulation, socket base decision on Network Layer -Layer 3)

What is the routing algorithm used by rip and igrp, Distance vector-based r...

Distance vector-based routing algorithms (also called as Bellman-Ford algorithms) pass periodic copies of a routing table from router to router. Regular updates among routers commu

What is kerberos in networking, What is Kerberos in Networking? It is a...

What is Kerberos in Networking? It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to stop intruders from discover

Ring token, what is logical ring maintenance and how does it work>?

what is logical ring maintenance and how does it work>?

What is an ethernet, What is an Ethernet? The Ethernet topology was dev...

What is an Ethernet? The Ethernet topology was developed at the University of Hawaii to connect computers on the many Islands. It was radio based design. Later, Robert Metacalf

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd