Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Given the following code I1 lw $t1, 8($s0) I2 add $s0, $s0, $s1 I3 sub $s1, $t1,

ID: 645534 • Letter: G

Question

Given the following code

                I1            lw           $t1,        8($s0)

                I2            add        $s0,        $s0,        $s1

                I3            sub         $s1,        $t1,        $t0

                Assume that forwarding is implemented.

                3.1          Are there any data hazards in the pipeline? If yes, between which pairs of instructions                                  do they happen.

                3.2 Show the status of the instruction pipeline, by inserting instructions, stages, and bubbles into appropriate cycle slots.

Instruction

Cycle 1

Cycle 2

Cycle 3

Cycle 4

Cycle 5

Cycle 5

Cycle 6

Cycle 7

Cycle 8

Instruction

Cycle 1

Cycle 2

Cycle 3

Cycle 4

Cycle 5

Cycle 5

Cycle 6

Cycle 7

Cycle 8

Explanation / Answer

1. No.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote