subject

A).For the following MIPS assembly code to be executed using the pipelined datapath, identify all of the data dependencies (which register in which instruction needs the result register value from which another instruction?) and enumerate them (give them numbers as 1,2, ...).
b).Which dependencies are data hazards that will be resolved via forwarding and without a stall (you can specify the number(s) from the part a)?
c).Which dependencies are data hazards that will cause a stall (you can specify the number(s) from the part a)?

add $t4, $t3, $t7
sub $t8, $t4, $t5
add $t9, $t8, $t4
lw $t7, 8($t4)
add $t1, $t7, $t5
sub $t5, $t3, $t1
lw $t3, 4($t5)

2. (6 pts) Consider executing the following code on the pipelined datapath that we discussed in class.
a). During the 5th cycle, which registers are being read and which register(s) will be written (using the register file)?

add $t5, $t7, $t6
sub $t1, $t2, $t7
add $t4, $t3, $t2
sub $t3, $t9, $t4
sub $t9, $t1, $t9

b). Explain what the forwarding unit is doing during the 5th cycle of execution. Which registers are being compared? List all pairs of registers that are compared during the 5th cycle for the forwarding unit. (First, you need to determine which instruction's values are in the EX/MEM, which instruction's values are in the MEM/WB register, and which instruction's values are read from the ID/EX register during the 5th cycle. Then check the conditions for forwarding.)

c). Explain what the hazard detection unit is doing during the 5th cycle of execution. Which registers are being compared? List all pairs of registers that are compared during the 5th cycle for the hazard detection unit. (You need to determine which instruction's values are in the IF/ID and which instruction's values are in the ID/EX register during the 5th cycle. Then check the conditions for the hazard detection.)

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 09:40
It is vital to research each of the services you plan to disable before implementing any change, especially on critical machines such as the: a. servers in the test environment. b. domain controller and other infrastructure servers. c. desktops that have previously been attacked. d. desktops used by upper-level management.
Answers: 2
question
Computers and Technology, 23.06.2019 06:30
Which option correctly describes a dbms application? a. software used to manage databases b. software used to organize files and folders c. software used to develop specialized images d. software used to create effective presentations
Answers: 1
question
Computers and Technology, 23.06.2019 18:00
Which finger presses the h key on the keyboard? index finger on the left hand pinky finger on the right hand index finger on the right hand thumb on the left hand
Answers: 1
question
Computers and Technology, 23.06.2019 18:30
How often does colleges update the cost of attendance on their website? . a)every two years b) every four years c) every year d) every semester
Answers: 1
You know the right answer?
A).For the following MIPS assembly code to be executed using the pipelined datapath, identify all of...
Questions
question
Mathematics, 06.01.2021 18:30
question
Mathematics, 06.01.2021 18:30
question
Mathematics, 06.01.2021 18:30
question
Mathematics, 06.01.2021 18:30
question
Mathematics, 06.01.2021 18:30
question
Mathematics, 06.01.2021 18:30
Questions on the website: 13722362