SlideShare a Scribd company logo
1 of 16
PIPELINED DATA PATH
MIPS Pipeline Instruction-execution classically takes 5 steps
1. Fetch
2. Decode
3. Execute
4. Memory Access
5. Write Back
Fetch Instruction from Memory
Decode the Instruction and Read Registers
Execute the operation / Calculate an address
Access an operand in Data Memory
Write the result into a register
The Simple Data Path
IF ID EX MEM WB
IF ID EX MEM WBInst 1
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CLOCK CYCLES
PROGRAMINSTRUCTIONS
Instruction 1 Instruction 1 Instruction 1 Instruction 1 Instruction 1
EXECUTION WITHOUT PIPELINING
SINGLE CYCLE IMPLEMENTATION
IF ID EX MEM WB
IF ID EX MEM WBInst 1
Inst 2 IF ID EX MEM WB
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CLOCK CYCLES
PROGRAMINSTRUCTIONS
Instruction 2 Instruction 2 Instruction 2 Instruction 2 Instruction 2
EXECUTION WITHOUT PIPELINING
SINGLE CYCLE IMPLEMENTATION
IF ID EX MEM WB
IF ID EX MEM WBInst 1
Inst 2 IF ID EX MEM WB
Inst 3 IF ID EX MEM WB
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CLOCK CYCLES
PROGRAMINSTRUCTIONS
Instruction 3 Instruction 3 Instruction 3 Instruction 3 Instruction 3
EXECUTION WITHOUT PIPELINING
SINGLE CYCLE IMPLEMENTATION
IF ID EX MEM WB
IF ID EX MEM WBlw $10,20($1)
IF ID EX MEM WB
IF ID EX MEM WB
1 2 3 4 5 6 7 8 9
CLOCK CYCLES
PROGRAMINSTRUCTIONS
Instruction 1 Instruction 1 Instruction 1 Instruction 1 Instruction 1
EXECUTION WITH PIPELINING
IF ID EX MEM WB
IF ID EX MEM WB
Instruction 2 Instruction 2Instruction 3 Instruction 2Instruction 3Instruction 4 Instruction 2Instruction 3Instruction 4Instruction 5
sub $11,$2,$3
add $12,$3,$4
lw $13,24($1)
add $14,$5,$6
Pipelining improves performance by increasing instruction throughput and
decreasing the execution time of an individual instruction
IMPLEMENTATION OF PIPELINING
A B C A B C
Ed: log |x.y|
A  x.y, B ||, C  log ()
Single Cycle Implementation of Data path
PIPELINED VERSION OF DATA PATH
INSTRUCTION FETCH
INSTRUCTION DECODE
EXECUTE
MEMORY ACCESS
WRITE BACK
IF ID EX MEM WB
IF ID EX MEM WBlw $10,20($1)
IF ID EX MEM WB
IF ID EX MEM WB
1 2 3 4 5 6 7 8 9
CLOCK CYCLES
PROGRAMINSTRUCTIONS
Instruction 1 Instruction 1 Instruction 1 Instruction 1 Instruction 1
EXECUTION WITH PIPELINING
IF ID EX MEM WB
IF ID EX MEM WB
Instruction 2 Instruction 2Instruction 3 Instruction 2Instruction 3Instruction 4 Instruction 2Instruction 3Instruction 4Instruction 5
sub $11,$2,$3
add $12,$3,$4
lw $13,24($1)
add $14,$5,$6
THE SINGLE-CLOCK-CYCLE DIAGRAM CORRESPONDING TO CLOCK CYCLE 5 OF THE PIPELINE

More Related Content

What's hot

Pipeline hazard
Pipeline hazardPipeline hazard
Pipeline hazardAJAL A J
 
Ct213 processor design_pipelinehazard
Ct213 processor design_pipelinehazardCt213 processor design_pipelinehazard
Ct213 processor design_pipelinehazardrakeshrakesh2020
 
Pipeline Mechanism
Pipeline MechanismPipeline Mechanism
Pipeline MechanismAshik Iqbal
 
Lec18 pipeline
Lec18 pipelineLec18 pipeline
Lec18 pipelineGRajendra
 
Comp architecture : branch prediction
Comp architecture : branch predictionComp architecture : branch prediction
Comp architecture : branch predictionrinnocente
 
Instruction pipeline
Instruction pipelineInstruction pipeline
Instruction pipelineajay_a
 
INSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMINSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMKamran Ashraf
 
Pipeline & Nonpipeline Processor
Pipeline & Nonpipeline ProcessorPipeline & Nonpipeline Processor
Pipeline & Nonpipeline ProcessorSmit Shah
 
Loop parallelization & pipelining
Loop parallelization & pipeliningLoop parallelization & pipelining
Loop parallelization & pipeliningjagrat123
 
Concept of Pipelining
Concept of PipeliningConcept of Pipelining
Concept of PipeliningSHAKOOR AB
 
Chapter 04 the processor
Chapter 04   the processorChapter 04   the processor
Chapter 04 the processorBảo Hoang
 
Pipelining , structural hazards
Pipelining , structural hazardsPipelining , structural hazards
Pipelining , structural hazardsMunaam Munawar
 

What's hot (20)

Pipeline hazard
Pipeline hazardPipeline hazard
Pipeline hazard
 
Pipeline
PipelinePipeline
Pipeline
 
Pipeline hazard
Pipeline hazardPipeline hazard
Pipeline hazard
 
Instruction pipelining
Instruction pipeliningInstruction pipelining
Instruction pipelining
 
Pipelining
PipeliningPipelining
Pipelining
 
Ct213 processor design_pipelinehazard
Ct213 processor design_pipelinehazardCt213 processor design_pipelinehazard
Ct213 processor design_pipelinehazard
 
Pipeline Mechanism
Pipeline MechanismPipeline Mechanism
Pipeline Mechanism
 
Lec18 pipeline
Lec18 pipelineLec18 pipeline
Lec18 pipeline
 
Comp architecture : branch prediction
Comp architecture : branch predictionComp architecture : branch prediction
Comp architecture : branch prediction
 
Instruction pipeline
Instruction pipelineInstruction pipeline
Instruction pipeline
 
3 Pipelining
3 Pipelining3 Pipelining
3 Pipelining
 
INSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMINSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISM
 
Pipeline & Nonpipeline Processor
Pipeline & Nonpipeline ProcessorPipeline & Nonpipeline Processor
Pipeline & Nonpipeline Processor
 
Assembly p1
Assembly p1Assembly p1
Assembly p1
 
Pipelining In computer
Pipelining In computer Pipelining In computer
Pipelining In computer
 
Loop parallelization & pipelining
Loop parallelization & pipeliningLoop parallelization & pipelining
Loop parallelization & pipelining
 
Concept of Pipelining
Concept of PipeliningConcept of Pipelining
Concept of Pipelining
 
Chapter 04 the processor
Chapter 04   the processorChapter 04   the processor
Chapter 04 the processor
 
Pipelining , structural hazards
Pipelining , structural hazardsPipelining , structural hazards
Pipelining , structural hazards
 
Chapter6 pipelining
Chapter6  pipeliningChapter6  pipelining
Chapter6 pipelining
 

Similar to Implementation of pipelining in datapath

3. Implementation of Pipelining in Datapath.pptx
3. Implementation of Pipelining in Datapath.pptx3. Implementation of Pipelining in Datapath.pptx
3. Implementation of Pipelining in Datapath.pptxKarthikeyanC53
 
2 ppt.pptx
2 ppt.pptx2 ppt.pptx
2 ppt.pptxkalai75
 
4. Pipeline Hazards.pptx
4. Pipeline Hazards.pptx4. Pipeline Hazards.pptx
4. Pipeline Hazards.pptxKarthikeyanC53
 
May2010 hex-core-opt
May2010 hex-core-optMay2010 hex-core-opt
May2010 hex-core-optJeff Larkin
 
Security Monitoring with eBPF
Security Monitoring with eBPFSecurity Monitoring with eBPF
Security Monitoring with eBPFAlex Maestretti
 
Adding a BOLT pass
Adding a BOLT passAdding a BOLT pass
Adding a BOLT passAmir42407
 
pipeline and vector processing
pipeline and vector processingpipeline and vector processing
pipeline and vector processingAcad
 
Web of Technologies Again
Web of Technologies AgainWeb of Technologies Again
Web of Technologies Againdynamis
 
f37-book-intarch-pres-pt2.ppt
f37-book-intarch-pres-pt2.pptf37-book-intarch-pres-pt2.ppt
f37-book-intarch-pres-pt2.pptssuserf06014
 
f37-book-intarch-pres-pt2.ppt
f37-book-intarch-pres-pt2.pptf37-book-intarch-pres-pt2.ppt
f37-book-intarch-pres-pt2.pptVhhvf
 
Understanding IBM Tivoli OMEGAMON for DB2 Batch Reporting, Customization and ...
Understanding IBM Tivoli OMEGAMON for DB2 Batch Reporting, Customization and ...Understanding IBM Tivoli OMEGAMON for DB2 Batch Reporting, Customization and ...
Understanding IBM Tivoli OMEGAMON for DB2 Batch Reporting, Customization and ...Cuneyt Goksu
 
Db2 V8 Migration And New Functions
Db2 V8 Migration And New FunctionsDb2 V8 Migration And New Functions
Db2 V8 Migration And New FunctionsCristian Molaro
 
Web of Technologies
Web of TechnologiesWeb of Technologies
Web of Technologiesdynamis
 
44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick
44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick
44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick44CON
 
Topic2a ss pipelines
Topic2a ss pipelinesTopic2a ss pipelines
Topic2a ss pipelinesturki_09
 
Lessons learned from Isbank - A Story of a DB2 for z/OS Initiative
Lessons learned from Isbank - A Story of a DB2 for z/OS InitiativeLessons learned from Isbank - A Story of a DB2 for z/OS Initiative
Lessons learned from Isbank - A Story of a DB2 for z/OS InitiativeCuneyt Goksu
 

Similar to Implementation of pipelining in datapath (20)

3. Implementation of Pipelining in Datapath.pptx
3. Implementation of Pipelining in Datapath.pptx3. Implementation of Pipelining in Datapath.pptx
3. Implementation of Pipelining in Datapath.pptx
 
2 ppt.pptx
2 ppt.pptx2 ppt.pptx
2 ppt.pptx
 
4. Pipeline Hazards.pptx
4. Pipeline Hazards.pptx4. Pipeline Hazards.pptx
4. Pipeline Hazards.pptx
 
Core pipelining
Core pipelining Core pipelining
Core pipelining
 
May2010 hex-core-opt
May2010 hex-core-optMay2010 hex-core-opt
May2010 hex-core-opt
 
Security Monitoring with eBPF
Security Monitoring with eBPFSecurity Monitoring with eBPF
Security Monitoring with eBPF
 
Adding a BOLT pass
Adding a BOLT passAdding a BOLT pass
Adding a BOLT pass
 
pipeline and vector processing
pipeline and vector processingpipeline and vector processing
pipeline and vector processing
 
4 Sessions
4 Sessions4 Sessions
4 Sessions
 
Web of Technologies Again
Web of Technologies AgainWeb of Technologies Again
Web of Technologies Again
 
f37-book-intarch-pres-pt2.ppt
f37-book-intarch-pres-pt2.pptf37-book-intarch-pres-pt2.ppt
f37-book-intarch-pres-pt2.ppt
 
f37-book-intarch-pres-pt2.ppt
f37-book-intarch-pres-pt2.pptf37-book-intarch-pres-pt2.ppt
f37-book-intarch-pres-pt2.ppt
 
Understanding IBM Tivoli OMEGAMON for DB2 Batch Reporting, Customization and ...
Understanding IBM Tivoli OMEGAMON for DB2 Batch Reporting, Customization and ...Understanding IBM Tivoli OMEGAMON for DB2 Batch Reporting, Customization and ...
Understanding IBM Tivoli OMEGAMON for DB2 Batch Reporting, Customization and ...
 
Db2 V8 Migration And New Functions
Db2 V8 Migration And New FunctionsDb2 V8 Migration And New Functions
Db2 V8 Migration And New Functions
 
Talk About Performance
Talk About PerformanceTalk About Performance
Talk About Performance
 
Web of Technologies
Web of TechnologiesWeb of Technologies
Web of Technologies
 
Pipelining in computer architecture
Pipelining in computer architecturePipelining in computer architecture
Pipelining in computer architecture
 
44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick
44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick
44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick
 
Topic2a ss pipelines
Topic2a ss pipelinesTopic2a ss pipelines
Topic2a ss pipelines
 
Lessons learned from Isbank - A Story of a DB2 for z/OS Initiative
Lessons learned from Isbank - A Story of a DB2 for z/OS InitiativeLessons learned from Isbank - A Story of a DB2 for z/OS Initiative
Lessons learned from Isbank - A Story of a DB2 for z/OS Initiative
 

More from babuece

Hardware Multi-Threading
Hardware Multi-ThreadingHardware Multi-Threading
Hardware Multi-Threadingbabuece
 
Introduction to Advance Computer Architecture
Introduction to Advance Computer ArchitectureIntroduction to Advance Computer Architecture
Introduction to Advance Computer Architecturebabuece
 
Clusters and Wharehouse Scale Computers
Clusters and Wharehouse Scale ComputersClusters and Wharehouse Scale Computers
Clusters and Wharehouse Scale Computersbabuece
 
Introduction to GPU
Introduction to GPUIntroduction to GPU
Introduction to GPUbabuece
 
Shared Memory Multi Processor
Shared Memory Multi ProcessorShared Memory Multi Processor
Shared Memory Multi Processorbabuece
 
Instruction Level Parallelism | Static Multiple Issue & Dynamic Multiple Issu...
Instruction Level Parallelism | Static Multiple Issue & Dynamic Multiple Issu...Instruction Level Parallelism | Static Multiple Issue & Dynamic Multiple Issu...
Instruction Level Parallelism | Static Multiple Issue & Dynamic Multiple Issu...babuece
 
Exception | How Exceptions are Handled in MIPS architecture
Exception | How Exceptions are Handled in MIPS architectureException | How Exceptions are Handled in MIPS architecture
Exception | How Exceptions are Handled in MIPS architecturebabuece
 
Introduction to Embedded Laboratory EC 8711
Introduction to Embedded Laboratory EC 8711 Introduction to Embedded Laboratory EC 8711
Introduction to Embedded Laboratory EC 8711 babuece
 
Datapath design with control unit
Datapath design with control unitDatapath design with control unit
Datapath design with control unitbabuece
 
Introduction to datapath design
Introduction to datapath designIntroduction to datapath design
Introduction to datapath designbabuece
 
Floating point Binary Represenataion
Floating point Binary RepresenataionFloating point Binary Represenataion
Floating point Binary Represenataionbabuece
 
Introduction to floating point Arithmetic
Introduction to floating point ArithmeticIntroduction to floating point Arithmetic
Introduction to floating point Arithmeticbabuece
 
Improved version of division
Improved version of divisionImproved version of division
Improved version of divisionbabuece
 
Booth's algorithm part 3
Booth's algorithm part 3Booth's algorithm part 3
Booth's algorithm part 3babuece
 
Booth's algorithm part 1
Booth's algorithm part 1Booth's algorithm part 1
Booth's algorithm part 1babuece
 
Modified booths algorithm part 1
Modified booths algorithm part 1Modified booths algorithm part 1
Modified booths algorithm part 1babuece
 
Booth's algorithm part 2
Booth's algorithm part 2Booth's algorithm part 2
Booth's algorithm part 2babuece
 
Booth's algorithm part 4
Booth's algorithm part 4Booth's algorithm part 4
Booth's algorithm part 4babuece
 
Modified booth's algorithm Part 2
Modified booth's algorithm Part 2Modified booth's algorithm Part 2
Modified booth's algorithm Part 2babuece
 
Sequential Version / Version 1 Unsigned Multiplication Algorithm
Sequential Version / Version 1 Unsigned Multiplication AlgorithmSequential Version / Version 1 Unsigned Multiplication Algorithm
Sequential Version / Version 1 Unsigned Multiplication Algorithmbabuece
 

More from babuece (20)

Hardware Multi-Threading
Hardware Multi-ThreadingHardware Multi-Threading
Hardware Multi-Threading
 
Introduction to Advance Computer Architecture
Introduction to Advance Computer ArchitectureIntroduction to Advance Computer Architecture
Introduction to Advance Computer Architecture
 
Clusters and Wharehouse Scale Computers
Clusters and Wharehouse Scale ComputersClusters and Wharehouse Scale Computers
Clusters and Wharehouse Scale Computers
 
Introduction to GPU
Introduction to GPUIntroduction to GPU
Introduction to GPU
 
Shared Memory Multi Processor
Shared Memory Multi ProcessorShared Memory Multi Processor
Shared Memory Multi Processor
 
Instruction Level Parallelism | Static Multiple Issue & Dynamic Multiple Issu...
Instruction Level Parallelism | Static Multiple Issue & Dynamic Multiple Issu...Instruction Level Parallelism | Static Multiple Issue & Dynamic Multiple Issu...
Instruction Level Parallelism | Static Multiple Issue & Dynamic Multiple Issu...
 
Exception | How Exceptions are Handled in MIPS architecture
Exception | How Exceptions are Handled in MIPS architectureException | How Exceptions are Handled in MIPS architecture
Exception | How Exceptions are Handled in MIPS architecture
 
Introduction to Embedded Laboratory EC 8711
Introduction to Embedded Laboratory EC 8711 Introduction to Embedded Laboratory EC 8711
Introduction to Embedded Laboratory EC 8711
 
Datapath design with control unit
Datapath design with control unitDatapath design with control unit
Datapath design with control unit
 
Introduction to datapath design
Introduction to datapath designIntroduction to datapath design
Introduction to datapath design
 
Floating point Binary Represenataion
Floating point Binary RepresenataionFloating point Binary Represenataion
Floating point Binary Represenataion
 
Introduction to floating point Arithmetic
Introduction to floating point ArithmeticIntroduction to floating point Arithmetic
Introduction to floating point Arithmetic
 
Improved version of division
Improved version of divisionImproved version of division
Improved version of division
 
Booth's algorithm part 3
Booth's algorithm part 3Booth's algorithm part 3
Booth's algorithm part 3
 
Booth's algorithm part 1
Booth's algorithm part 1Booth's algorithm part 1
Booth's algorithm part 1
 
Modified booths algorithm part 1
Modified booths algorithm part 1Modified booths algorithm part 1
Modified booths algorithm part 1
 
Booth's algorithm part 2
Booth's algorithm part 2Booth's algorithm part 2
Booth's algorithm part 2
 
Booth's algorithm part 4
Booth's algorithm part 4Booth's algorithm part 4
Booth's algorithm part 4
 
Modified booth's algorithm Part 2
Modified booth's algorithm Part 2Modified booth's algorithm Part 2
Modified booth's algorithm Part 2
 
Sequential Version / Version 1 Unsigned Multiplication Algorithm
Sequential Version / Version 1 Unsigned Multiplication AlgorithmSequential Version / Version 1 Unsigned Multiplication Algorithm
Sequential Version / Version 1 Unsigned Multiplication Algorithm
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

Implementation of pipelining in datapath

  • 1. PIPELINED DATA PATH MIPS Pipeline Instruction-execution classically takes 5 steps 1. Fetch 2. Decode 3. Execute 4. Memory Access 5. Write Back Fetch Instruction from Memory Decode the Instruction and Read Registers Execute the operation / Calculate an address Access an operand in Data Memory Write the result into a register
  • 3. IF ID EX MEM WB IF ID EX MEM WBInst 1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 CLOCK CYCLES PROGRAMINSTRUCTIONS Instruction 1 Instruction 1 Instruction 1 Instruction 1 Instruction 1 EXECUTION WITHOUT PIPELINING SINGLE CYCLE IMPLEMENTATION
  • 4. IF ID EX MEM WB IF ID EX MEM WBInst 1 Inst 2 IF ID EX MEM WB 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 CLOCK CYCLES PROGRAMINSTRUCTIONS Instruction 2 Instruction 2 Instruction 2 Instruction 2 Instruction 2 EXECUTION WITHOUT PIPELINING SINGLE CYCLE IMPLEMENTATION
  • 5. IF ID EX MEM WB IF ID EX MEM WBInst 1 Inst 2 IF ID EX MEM WB Inst 3 IF ID EX MEM WB 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 CLOCK CYCLES PROGRAMINSTRUCTIONS Instruction 3 Instruction 3 Instruction 3 Instruction 3 Instruction 3 EXECUTION WITHOUT PIPELINING SINGLE CYCLE IMPLEMENTATION
  • 6. IF ID EX MEM WB IF ID EX MEM WBlw $10,20($1) IF ID EX MEM WB IF ID EX MEM WB 1 2 3 4 5 6 7 8 9 CLOCK CYCLES PROGRAMINSTRUCTIONS Instruction 1 Instruction 1 Instruction 1 Instruction 1 Instruction 1 EXECUTION WITH PIPELINING IF ID EX MEM WB IF ID EX MEM WB Instruction 2 Instruction 2Instruction 3 Instruction 2Instruction 3Instruction 4 Instruction 2Instruction 3Instruction 4Instruction 5 sub $11,$2,$3 add $12,$3,$4 lw $13,24($1) add $14,$5,$6 Pipelining improves performance by increasing instruction throughput and decreasing the execution time of an individual instruction
  • 7. IMPLEMENTATION OF PIPELINING A B C A B C Ed: log |x.y| A  x.y, B ||, C  log ()
  • 15. IF ID EX MEM WB IF ID EX MEM WBlw $10,20($1) IF ID EX MEM WB IF ID EX MEM WB 1 2 3 4 5 6 7 8 9 CLOCK CYCLES PROGRAMINSTRUCTIONS Instruction 1 Instruction 1 Instruction 1 Instruction 1 Instruction 1 EXECUTION WITH PIPELINING IF ID EX MEM WB IF ID EX MEM WB Instruction 2 Instruction 2Instruction 3 Instruction 2Instruction 3Instruction 4 Instruction 2Instruction 3Instruction 4Instruction 5 sub $11,$2,$3 add $12,$3,$4 lw $13,24($1) add $14,$5,$6
  • 16. THE SINGLE-CLOCK-CYCLE DIAGRAM CORRESPONDING TO CLOCK CYCLE 5 OF THE PIPELINE