Chapter One Introduction to Pipelined Processors.

Slides:



Advertisements
Similar presentations
Lecture 15. Graph Algorithms
Advertisements

State Machine Design Procedure
CS5365 Pipelining. Divide task into a sequence of subtasks. Each subtask is executed by a stage (segment)of the pipe.
CSE Advanced Computer Architecture Week-4 Week of Feb 2, 2004 engr.smu.edu/~rewini/8383.
Chapter 9 Computer Design Basics. 9-2 Datapaths Reminding A digital system (or a simple computer) contains datapath unit and control unit. Datapath: A.
Transportation Problem (TP) and Assignment Problem (AP)
Chapter 3 Pipelining. 3.1 Pipeline Model n Terminology –task –subtask –stage –staging register n Total processing time for each task. –T pl =, where t.
Bounds on Code Length Theorem: Let l ∗ 1, l ∗ 2,..., l ∗ m be optimal codeword lengths for a source distribution p and a D-ary alphabet, and let L ∗ be.
Sequential Logic Design with Flip-flops
Registers.1. Register  Consists of N Flip-Flops  Stores N bits  Common clock used for all Flip-Flops Shift Register  A register that provides the.
MODERN OPERATING SYSTEMS Third Edition ANDREW S. TANENBAUM Chapter 6 Deadlocks Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall, Inc. All.
3 -1 Chapter 3 The Greedy Method 3 -2 The greedy method Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each.
Liang, Introduction to Java Programming, Eighth Edition, (c) 2011 Pearson Education, Inc. All rights reserved Chapter 26 Binary Search Trees.
Deadlock Detection with One Resource of Each Type (1)
Grover’s Algorithm in Machine Learning and Optimization Applications
Binary Trees Chapter 6.
C o n f i d e n t i a l HOME NEXT Subject Name: Data Structure Using C Unit Title: Graphs.
© The McGraw-Hill Companies, Inc., Chapter 3 The Greedy Method.
© 2006 Pearson Addison-Wesley. All rights reserved14 A-1 Chapter 14 Graphs.
Introduction n – length of text, m – length of search pattern string Generally suffix tree construction takes O(n) time, O(n) space and searching takes.
1 KU College of Engineering Elec 204: Digital Systems Design Lecture 21 Multiplier Example Example: (101 x 011) Base 2 Note that the partial product summation.
Convolutional Codes. p2. OUTLINE  [1] Shift registers and polynomials  [2] Encoding convolutional codes  [3] Decoding convolutional codes  [4] Truncated.
Chapter 6 Binary Trees. 6.1 Trees, Binary Trees, and Binary Search Trees Linked lists usually are more flexible than arrays, but it is difficult to use.
Business Mathematics MTH-367 Lecture 15. Chapter 11 The Simplex and Computer Solutions Methods continued.
Computer Science and Engineering Copyright by Hesham El-Rewini Advanced Computer Architecture CSE 8383 January Session 3.
Anshul Kumar, CSE IITD CSL718 : Pipelined Processors  Types of Pipelines  Types of Hazards 16th Jan, 2006.
LINEAR PROGRAMMING. 2 Introduction  A linear programming problem may be defined as the problem of maximizing or minimizing a linear function subject.
Introduction Object oriented design is a method where developers think in terms of objects instead of procedures or functions. SA/SD approach is based.
Digital Logic Design.
CS151 Introduction to Digital Design
1 Network Models Transportation Problem (TP) Distributing any commodity from any group of supply centers, called sources, to any group of receiving.
Principles of Linear Pipelining. In pipelining, we divide a task into set of subtasks. The precedence relation of a set of subtasks {T 1, T 2,…, T k }
1 Thus far what we only dealt with a pure combination circuit That means output was simply dependent on the current input However, output may depend on.
Chapter One Introduction to Pipelined Processors
© Copyright 2012 by Pearson Education, Inc. All Rights Reserved. 1 Chapter 19 Binary Search Trees.
© 2006 Pearson Addison-Wesley. All rights reserved 14 A-1 Chapter 14 Graphs.
Computer Science and Engineering Copyright by Hesham El-Rewini Advanced Computer Architecture CSE 8383 February 2, 2006 Session 6.
Chapter 8: Relations. 8.1 Relations and Their Properties Binary relations: Let A and B be any two sets. A binary relation R from A to B, written R : A.
Chapter One Introduction to Pipelined Processors
1 Languages: Finite State Machines Chapter 6 problemsstrings (languages) machines answers.
Principles of Linear Pipelining
1 TCOM 5143 Lecture 10 Centralized Networks: Time Delay and Cost Tradeoffs.
3 BIT DOWN COUNTER SUBJECT: DIGITAL ELECTONICS CODE: COLLEGE: BVM ENGINEERING COLLEGE COLLEGE CODE:008 ELECTRONICS & TELECOMMUNICATION DEPT.
L ECTURE 3 T HEORY OF AUTOMATA. E QUIVALENT R EGULAR E XPRESSIONS Definition Two regular expressions are said to be equivalent if they generate the same.
Design at the Register Transfer Level Algorithmic State Machines 07.
UNC Chapel Hill M. C. Lin Geometric Data Structures Reading: Chapter 10 of the Textbook Driving Applications –Windowing Queries Related Application –Query.
MODERN OPERATING SYSTEMS Third Edition ANDREW S
Sequential logic design principles
Computer Design Basics
IAY 0600 Digital Systems Design
Pipeline Design Problems
Introduction to Pipelined Processors
Chapter One Introduction to Pipelined Processors
Tree traversal from Introduction to Trees Chapter 6 Objectives
Chapter One Introduction to Pipelined Processors
Chapter One Introduction to Pipelined Processors
Subject Name: Information Theory Coding Subject Code: 10EC55
Chapter 1: Introduction
Hash Tables Chapter 12.7 Wherein we throw all the data into random array slots and somehow obtain O(1) retrieval time Nyhoff, ADTs, Data Structures and.
CSE 370 – Winter Sequential Logic-2 - 1
Lecture 17 Logistics Last lecture Today HW5 due on Wednesday
Electronics for Physicists
IAS 0600 Digital Systems Design
Computer Design Basics
Chapter 15 Graph Theory © 2008 Pearson Addison-Wesley.
Lecture 17 Logistics Last lecture Today HW5 due on Wednesday
Chapter 14 Graphs © 2011 Pearson Addison-Wesley. All rights reserved.
EGR 2131 Unit 12 Synchronous Sequential Circuits
MODERN OPERATING SYSTEMS Third Edition ANDREW S
Digital Logic Design.
Presentation transcript:

Chapter One Introduction to Pipelined Processors

Principle of Designing Pipeline Processors (Design Problems of Pipeline Processors)

State Diagram

Shortcut Method of finding Latency Forbidden Latency Set,F = {5} U {2} U {2} = { 2,5}

State Diagram The initial collision vector (ICV) is a binary vector formed from F such that C = (C n …. C 2 C 1 ) where C i = 1 if i  F and C i = 0 if otherwise Thus in our example F = { 2,5 } C = ( )

State Diagram The procedure is as follows: 1.Start with the ICV 2.For each unprocessed state, For each bit i in the CV i which is 0, do the following: a.Shift CV i right by i bits b.Drop i rightmost bits

State Diagram c.Append zeros to left d.Logically OR with ICV e.If step(d) results in a new state then form a new node for this state and join it with node of CV i by an arc with a marking i. This shifting process needs to continue until no more new states can be generated.

State Diagram

State Diagram ICV – OR CV i – CV*11011 i = 1 1

State Diagram ICV – OR CV i – CV*10010 i = 3 3

State Diagram ICV – OR CV i – CV*10011 i = 4

State Diagram ICV – OR CV i – CV*10010 i = 5 5

State Diagram ICV – OR CV i – CV*10010 i =3 5 3

State Diagram ICV – OR CV i – CV*10011 i =

State Diagram ICV – OR CV i – CV*10011 i =

State Diagram ICV – OR CV i – CV*10010 i =

State Diagram ICV – OR CV i – CV*10010 i =

State Diagram The state with all zeros has a self-loop which corresponds to empty pipeline and it is possible to wait for indefinite number of latency cycles of the form (7),(8), (9),(10) etc. Simple Cycle: latency cycle in which each state is encountered only once. Complex Cycle: consists of more than one simple cycle in it. It is enough to look for simple cycles

State Diagram Greedy Cycle: A simple cycle is a greedy cycle if each latency contained in a cycle is the minimal latency(outgoing arc) from a state in the cycle. A good task initiation sequence should include the greedy cycle.

Simple cycles & Greedy cycles The Simple cycles are? The Greedy cycles are ?

Simple cycles & Greedy cycles The simple cycles are (3),(5),(1,3,3),(4,3) and (4) The Greedy cycle is (1,3,3)

State Diagram In the above example, the cycle that offers MAL is (1, 3, 3) (MAL = (1+3+3)/3 =2.333)

SaA1A1 A2A2 A5A5 A1A1 A2A2 A8A8 A5A5 A8A8 SbA1A1 A2A2 A1A1 A2A2 A5A5 A5A5 A8A8 A8A8 ScA1A1 A2A2 A1A1 A2A2 A5A5 A5A5 A8A8 A8A8

UQ: Problem Consider the reservation table given below S1S1 xx S2S2 xxx S3S3 x S4S4 xx S5S5 xx

Problem i.Find the forbidden set of latencies ii.State the collision vector iii.Draw the state transition diagram iv.List simple cycles and greedy cycles v.Calculate MAL (minimum average latency)