Preview

Pipelining

Satisfactory Essays
Open Document
Open Document
3624 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Pipelining
Pipelining
• Principles of pipelining
• Simple pipelining
• Structural Hazards
• Data Hazards
• Control Hazards
• Interrupts
• Multicycle operations
• Pipeline clocking

© 1998 by Hill, Wood, Sohi,
Smith and Vijaykumar and
Moshovos

ECE D52 Lecture Notes: Chapter 3

1

Sequential Execution Semantics
We will be studying techniques that exploit the semantics of
Sequential Execution.
Sequential Execution Semantics: instructions appear as if they executed in the program specified order and one after the other
Alternatively
At any given point in time we should be able to identify an instruction so that: 1. All preceding instructions have executed
2. None following has executed

© 1998 by Hill, Wood, Sohi,
Smith and Vijaykumar and
Moshovos

ECE D52 Lecture Notes: Chapter 3

2

Exploiting Sequential Semantics
• The “it should appear” is the key
• The only way one can inspect execution order is via the machine’s state
This includes registers, memory and any other named storage
We will looking at techniques that relax execution order while preserving sequential execution semantics

© 1998 by Hill, Wood, Sohi,
Smith and Vijaykumar and
Moshovos

ECE D52 Lecture Notes: Chapter 3

3

Steps of Instruction Execution
Instruction execution is not a monolithic action

Fetch
Decode

There are multiple microactions involved

Read Operands
Operation
Writeback Result
Determine Next Instruction
© 1998 by Hill, Wood, Sohi,
Smith and Vijaykumar and
Moshovos

ECE D52 Lecture Notes: Chapter 3

4

Pipelining: Partially Overlap Instructions
Unpipelined

time

1/Throughput

instructions latency Pipelined

1/Throughput

time instructions latency

Time sequential
Ideally: Time pipeline = ----------------------------------------PipelineDepth

This ignores fill and drain times
© 1998 by Hill, Wood, Sohi,
Smith and Vijaykumar and
Moshovos

ECE D52 Lecture Notes: Chapter 3

5

Sequential

You May Also Find These Documents Helpful

  • Satisfactory Essays

    SD1230 Lab 1

    • 239 Words
    • 2 Pages

    2. What type of instruction is used to execute different code based on a condition? -Jumps…

    • 239 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The second category of fault changes individual instructions in the text segment. These faults are intended to approximate the assembly-level manifestation of real C-level programming…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    En1320 Unit 1 Research Paper 1

    • 27742 Words
    • 111 Pages

    instructions to load the registers of the processor with data from a central memory and to…

    • 27742 Words
    • 111 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1&2 Discussion

    • 379 Words
    • 2 Pages

    Access control is typically achieved by reserving a collection of bits within the general “Flag Register” to indicate the current “access control level”. Certain instructions are restricted so that they are only legal if the “access control level” is at least some minimum value; otherwise the instruction generates an “illegal operation” interrupt.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Sheet01

    • 1045 Words
    • 5 Pages

    4. What is the result of the following code and where is it kept? LDAA #$15 ADDA #$13 5. Which of the following instructions is (are) illegal? a- LDAA #500 b- LDAA #50 c- LDAA #00 d- LDAA #$255 e- LDAA #$25 f- LDAA #$F5 g- ADDA mybyte , #$25 6. Which of the following instructions is (are) illegal? a- ADDA #$300 b- ADDA #$50 c- ADDA #$500 d- ADDA #$255 e- ADDA #12 f- ADDA#$F5 g- ADDA #$25 7. 8. 9. 10. Show a simple code to load values 30H and 97H into locations 805H and 806H, respectively. Show a simple code to load value 55H into locations 300H and 308H. Show a simple code to load value 5FH into Port B. Which of the following is an invalid use of the immediate addressing mode? a- LDDA #$24 b- LDAA $30 c- LDAA #$60…

    • 1045 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    1. The logical structure in which one instruction occurs after another with no branching is a ______A______.…

    • 765 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The expression 1 To 5 in the Case 1 To 5 clause specifies the range of numbers from ____.…

    • 595 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyp 3.2 1.1

    • 4895 Words
    • 20 Pages

    May need instructions repeated lots of time and may need instruction to be broken/ simplified.…

    • 4895 Words
    • 20 Pages
    Powerful Essays
  • Better Essays

    Pipeda

    • 1242 Words
    • 5 Pages

    The PIPEDA requires that any business that collects, uses or discloses personal information in the course of commercial activity establish privacy policies and practices based on the following ten privacy principles of the Canadian Standard Association’s Model Code for the Protection of Personal Information. This code was developed by Canadian businesses, academics, consumers and government through the Canadian Standards Association and has been incorporated as a schedule to PIPEDA.…

    • 1242 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Exploratory Paper

    • 956 Words
    • 3 Pages

    Martin Bright Home, A. E. (2005, July 3). Secret report says war on drugs has failed. The Observer. Retrieved from http://search.proquest.com.ezproxy.libproxy.db.erau.edu/docview/250306073?accountid=27203…

    • 956 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Book Review

    • 1167 Words
    • 5 Pages

    Petersen breaks down the communication process in five parts. These areas come are separate and work together in different ways. Petersen breaks down the communication process so it easy to understand.…

    • 1167 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Psychology

    • 371 Words
    • 2 Pages

    By remembering key aspects the program, the information will come naturally since you are the one that created it.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Agent Installation Guide

    • 15121 Words
    • 61 Pages

    Agent Installation Guide 5.0 - Documentation Release 1 This document, as well as the software described in it, is confidential and contains proprietary information protected by non-disclosure agreements. No part of this document may be reproduced in any form or disclosed to any party not bound by a non-disclosure agreement without the express written consent of Absolute Software Corporation. Absolute Software Corporation reserves the right to revise this document and to periodically make changes in the content hereof without obligation of such revisions or changes unless required to do so by prior agreement. Information contained herein is believed to be correct, but is provided solely for guidance in product application and not as a warranty of any kind. Absolute Software Corporation assumes no responsibility for use of this information, nor for any infringements of patents or other rights of third parties resulting from the use of this information. Absolute Software Corporation, Suite 1600, Four Bentall Centre, 1055 Dunsmuir Street PO Box 49211 Vancouver, British Columbia, Canada V7X 1K8. ©2010 Absolute Software Corporation. All rights reserved. Computrace®, Computrace Mobile™ and Absolute are registered trademarks of Absolute Software Corporation. All other trademarks are property of their respective owners. Computrace US Patents #5,715,174, #5,764,892, #5,802,280, #5,896,497 #6,244,758, #6,269,392, #6,300,863, and #6,507 , ,914. Canadian Patents #2,205,370 and #2,284,806. U.K Patents #EP793823, and #GB2338101. German Patent #695 125 34.6-08. Australian patent #699045. Japanese Patent #JP4067035. The Trademarks BlackBerry®, RIM®, Electron™, Pearl™, Pearl Flip™, Storm™, Curve™ and Bold™ are owned by Research In Motion Limited and are registered in the United States and may be pending or registered in other countries. Absolute Software Inc. is not endorsed, sponsored, affiliated with or otherwise…

    • 15121 Words
    • 61 Pages
    Powerful Essays
  • Powerful Essays

    Steganography applications conceal information in other, seemingly innocent media. Steganographic results may masquerade as other file for data types, be concealed within various media, or even hidden in network traffic or disk space. We are only limited by our imagination in the many ways information and data can be exploited to conceal additional information.…

    • 2269 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Short for "Web log". A blog is an online journal or diary of an individual’s…

    • 3289 Words
    • 14 Pages
    Good Essays