Explain the term instruction pipelines, Computer Networking

Assignment Help:

Instruction Pipelines

The stream of instructions in instruction execution cycle may be realized by a pipeline where overlapped executions of various operations are performed. The procedure of executing the instruction includes subsequent main steps:

  • Fetch the instruction from main memory
  • Decode the instruction
  • Fetch the operand
  • Execute the decoded instruction

These 4 steps turn out to be the candidates for phase for the pipeline that we know as instruction pipeline (It is displayed in Figure below).

1076_instruction pipelines.png

          Figure: Instruction Pipeline

Because in pipelined execution there is overlapped implementation of operations, the 4 phases of the instruction pipeline would work in overlapped manner. Firstly instruction address is fetched from memory to first phase of pipeline. First phase fetches the instruction and gives its output to second phase. Whereas second phase of the pipeline is decoding the instruction, the first phase gets other input as well as fetches the subsequent instruction. When the first instruction has been decoded in second phase then its o/p (output) is fed to the third stage. When third phase is fetching the operand for the first instruction then the second phase gets the second instruction in addition the first phase gets input for other instruction and so on. In this approach the pipeline is implementing the instruction in an overlapped way increasing the speed and throughput of execution.

The scenario of the overlapped operations in instruction pipeline can be explained by the space-time figure. In Figure, firstly we show the space-time figure for non-overlapped execution in a serial environment and then for the overlapped pipelined environment. It's clear from the two figures that in non-overlapped execution results are achieved only after 4 cycles as in overlapped pipelined execution after four cycles we are getting O/P (output) after every cycle. Soon in instruction pipeline the instruction cycle has been decreased to ¼ of the sequential execution.

2474_instruction pipelines 1.png


Related Discussions:- Explain the term instruction pipelines

Point out the drawbacks of token ring, Point out the drawbacks of Token Rin...

Point out the drawbacks of Token Ring. Few of the drawbacks of Token Ring are: a. Token Ring is very costly. All topology components cost much more than other more popular s

Create a wireless can, You are the network administrator for the City of Jo...

You are the network administrator for the City of Joshua Texas. The city government offices are located in five buildings separated by a State Highway controlled by the State of Te

State the congestion avoidance process, State the congestion avoidance proc...

State the congestion avoidance process Notifies the source that congestion avoidance process should be initiated where applicable for traffic in the opposite direction of the r

Encryption authentication - point to point , Encryption Authentication ...

Encryption Authentication One common  technique  used to encrypt and authenticate in VPNs is IP security. IP sec  is a collection of protocols designed by the IETF( Internet En

Communication protocol - internet protocol, The Internet protocol mentions ...

The Internet protocol mentions the rules that describe the details of how computers communicate. It exactly mentions how a packet should be formed & how a router should forward eac

What is message oriented middleware, What is Message Oriented Middleware (M...

What is Message Oriented Middleware (MOM)? MOM permits general purpose messages to be exchanged in a Client/Server system using message queues. Applications communicate over n

Network access technologies, Question 1 Explain the following with respect...

Question 1 Explain the following with respect to Data Encoding                     Digital Signaling of Digital Data                     Digital Signal Encoding Techniques Questi

Program to reload the router -ccna, Cable, Erase, and Reload the Router ...

Cable, Erase, and Reload the Router Step 1: Cable the network. Cable a network that is same to the one in the topology diagram. Step 2: Clear the configuration on the rou

Different types of subnet classfull networks are present, How many dissimil...

How many dissimilar types of subnet classful networks are present?

Working of TCP - buffers, Q. Working of  TCP - buffers? TCP - buffers ...

Q. Working of  TCP - buffers? TCP - buffers Sending & receiving buffers - Processes don't consume data at the same speed Sending site: - White section: unfilled

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd