Explain throughput performance and issues in pipelining, Computer Engineering

Assignment Help:

Throughput

Throughput of a pipeline may be defined as number of results which have been achieved per unit time. It can be referred as:

T = n / [m + (n-1)]. c = E / c

Throughput indicates the computing power of a pipeline. 

Utmost efficiency, speed up and throughput are the ideal cases however these are not achieved in practical cases because the speedup is limited because of the subsequent factors:

  • Data dependency between successive tasks: There can be dependencies between the instructions of two tasks used in pipeline. E.g. one instruction can't be started till the prior instruction yields the results as both are interdependent. Another Illustration of data dependency would be when that both instructions attempt to modify the same data object. These are termed as data hazards.

 

  • Resource Constraints: When resources aren't accessible at the time of execution then delays are caused in pipelining. E.g. if one common memory is used for both instructions and data and there is need to read and write and fetch an instruction at the same instance then only one can be performed and the other has to wait. Another instance of limited resource such as execution unit that might be busy at the required time.

 

  • Branch Instructions and Interrupts in the program: A program isn't a straight flow of serial instructions. There can be branch instructions which alter the general flow of program, which delays pipelining execution and influences the performance. In the same way, there are interrupts which postpones the execution of subsequent instruction till the interrupt has been serviced. Interrupts and Branches have damaging effects on the pipelining.

Related Discussions:- Explain throughput performance and issues in pipelining

Which analysis finds syntactic structure of source statement, An analysis, ...

An analysis, which determines the syntactic structure of the source statement, is called ? Ans. Syntax analysis that determines the syntactic structure of the source statement.

Data parallel model - parallel programming model, In the data parallel mode...

In the data parallel model, many of the parallel work focus on performing operations on a data set. The data set is usually organized into a common structure, such as an array or a

Build a tv remote control, Communication by devices, such as the HC11 proce...

Communication by devices, such as the HC11 processor, is a key and vital part of most systems that are used in military, commercial, and academic settings.  In fact, most of these

Describe about javascript, World Wide Web (WWW) began as a text-only medium...

World Wide Web (WWW) began as a text-only medium. First version doesn't even have the capability to include graphics on a page. Today's Web sites include sound animation, graphics,

Determine the use of loop instruction, Q. Determine the use of LOOP instruc...

Q. Determine the use of LOOP instruction? Program: This program prints the alphabets (A-Z) ; Register used: AX, CX, DX CODE SEGMENT ASSUME: CS: CODE.     MAINP:

Binary equivalent of the decimal number 368 , What is the binary equivalent...

What is the binary equivalent of the decimal number 368 ? Ans. 101110000 is the Binary equivalent of the Decimal number 368. From Decimal number to Binary number conversioni

What are the steps involved in designing, Before getting into the design th...

Before getting into the design the designer should go by the SRS prepared by the System Analyst. The main tasks of design are Architectural Design & Detailed Design. In Arch

What is remote login, Remote Login  A login that permits a user termina...

Remote Login  A login that permits a user terminal to connect to a host computer by a network or direct telecommunications link, and to interact with that host computer as if t

Design a mod-6 synchronous counter, Design a MOD-6 synchronous counter usin...

Design a MOD-6 synchronous counter using J-K Flip-Flops. Ans: Design of Mod-6 Counter:   To design the Mod-6 synchronous counter, contain six counter states (that is, from

Give some examples of malicious data, Give some examples of malicious data....

Give some examples of malicious data. In May 2002 year, the Norton Anti-Virus software for Windows operating systems detected around 61000 malicious programs. Several of them a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd