Very long instruction word architecture, Computer Engineering

Assignment Help:

Superscalar architecture was designed to increase the speed of the scalar processor. But it has been realized it's not easy to apply. Subsequent are a number of problems faced in the superscalar architecture:

• It is needed that extra hardware should be given for hardware parallelism like decoder and arithmetic units, instruction registers etc.

• Scheduling of instructions dynamically to diminish the pipeline delays and to keep all processing units busy is very hard.

Another option to increase speed of processor is to use a series of instructions having no dependency and might need various resources so avoiding resource conflicts. The concept is to unite these independent instructions in a compact long word integrating many operations to be executed concurrently. So this architecture is known as "very long instruction word (VLIW) architecture". Actually long instruction expressions carry the opcode of various instructions that are dispatched to several functional units of the processor. In this manner all the operations to be implemented concurrently by the functional units are synchronized in a VLIW instruction. The size of VLIW instruction word may be in hundreds of bits. VLIW instructions should be formed by compacting small instruction words of conventional program. The job of compaction in VLIW is completed by compiler. The processor should have the enough resources to implement all the operations in VLIW word concurrently.


Related Discussions:- Very long instruction word architecture

Explain transmission gate-based d-latch, The Transmission-Gate input is lin...

The Transmission-Gate input is linked to the D_LATCH data input (D), the control input to the Transmission-Gate is linked to the D_LATCH enable input (EN) and the Transmission-Gate

Disadvantages of unauthenticated sites, Disadvantages of unauthenticated si...

Disadvantages of unauthenticated sites All the Units entering the Intranet must be scrutinised to ensure that they are not coming from the unauthenticated sites or users. It a

Execute sparse matrix dynamically, To execute sparse matrix dynamically, Wh...

To execute sparse matrix dynamically, Which data structure is used Linked List data structure is used to execute sparse matrix dynamically

The spanning tree of connected graph with 10 vertices, The spanning tree of...

The spanning tree of connected graph with 10 vertices have 9 edges of spanning tree of connected graph with 10 vertices

How cloud can be used in event schedules, How cloud can be used in Event Sc...

How cloud can be used in Event Schedules and Management with an example. Web-based calendars can be used to post dates and schedules for specific public events, such as school

Functions to remove common walls, We must also be able to remove common wal...

We must also be able to remove common walls between two cells. Write the function removewalls that accepts two cells and removes the wall that is common between the two (hint: any

Explain about local area network, Q. Explain about Local Area Network? ...

Q. Explain about Local Area Network? Local Area Network (LAN):  It is privately owned communication systems that cover up a small area, say a complex of buildings or school. Le

Explain vector processing with pipelining, Vector Processing with Pipelinin...

Vector Processing with Pipelining Because in vector processing vector instructions execute the similar computation on various data operands repeatedly, vector processing is the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd