Explain the term instruction pipelines, Computer Networking

Assignment Help:

Instruction Pipelines

The stream of instructions in instruction execution cycle may be realized by a pipeline where overlapped executions of various operations are performed. The procedure of executing the instruction includes subsequent main steps:

  • Fetch the instruction from main memory
  • Decode the instruction
  • Fetch the operand
  • Execute the decoded instruction

These 4 steps turn out to be the candidates for phase for the pipeline that we know as instruction pipeline (It is displayed in Figure below).

1076_instruction pipelines.png

          Figure: Instruction Pipeline

Because in pipelined execution there is overlapped implementation of operations, the 4 phases of the instruction pipeline would work in overlapped manner. Firstly instruction address is fetched from memory to first phase of pipeline. First phase fetches the instruction and gives its output to second phase. Whereas second phase of the pipeline is decoding the instruction, the first phase gets other input as well as fetches the subsequent instruction. When the first instruction has been decoded in second phase then its o/p (output) is fed to the third stage. When third phase is fetching the operand for the first instruction then the second phase gets the second instruction in addition the first phase gets input for other instruction and so on. In this approach the pipeline is implementing the instruction in an overlapped way increasing the speed and throughput of execution.

The scenario of the overlapped operations in instruction pipeline can be explained by the space-time figure. In Figure, firstly we show the space-time figure for non-overlapped execution in a serial environment and then for the overlapped pipelined environment. It's clear from the two figures that in non-overlapped execution results are achieved only after 4 cycles as in overlapped pipelined execution after four cycles we are getting O/P (output) after every cycle. Soon in instruction pipeline the instruction cycle has been decreased to ¼ of the sequential execution.

2474_instruction pipelines 1.png


Related Discussions:- Explain the term instruction pipelines

Explain ring interconnection networks, Ring: It is a simple linear array w...

Ring: It is a simple linear array where end nodes are associated.  It is equal to a mesh with wrap around connections.  The data transfer in a ring is generally one direction. So,

Flash updates, IGRP uses flash updates, poison reverse updates, hold down t...

IGRP uses flash updates, poison reverse updates, hold down times, and divide horizon. How often does it broadcast its routing table updates? Ans) 90 seconds

Example of go back - N protocol, Q. Example of go back - N protocol? Th...

Q. Example of go back - N protocol? The window size is 4. A sender has sent frame 6 as well as the timer expires for frame 3 (frame 3 not ACKn'd). The sender goes back as we

Explain the bit-level encryption, Q. Explain the Bit-Level Encryption? ...

Q. Explain the Bit-Level Encryption? Bit-Level Encryption - Data is divided into blocks of bits then altered by encoding/decoding, permutation, substitution, exclusive OR

Determine in detail about the world wide web, Determine in detail about the...

Determine in detail about the world wide web The latest has been Web commerce that is currently making big news, and many businesses are setting up electronic shops on the Inte

Error control in TCP, Q. Show the Error control in TCP? Error control ...

Q. Show the Error control in TCP? Error control in TCP Detect lost segments, out-of-order segments, corrupted segments and duplicated segments Three tools: chec

Explain the term- encryption, Explain the term- Encryption Because all ...

Explain the term- Encryption Because all of the user traffic, as well as control traffic, is digitized in second generation systems, it is a relatively simple matter to encrypt

Disk encryption and block cipher, Suppose AES (or any block cipher) is used...

Suppose AES (or any block cipher) is used to encrypt data. Which mode of encryption covered in class is best suited for each of the following two scenarios and why? If more than on

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd