Preview

Pipelining

Satisfactory Essays
Open Document
Open Document
3624 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Pipelining
Pipelining
• Principles of pipelining
• Simple pipelining
• Structural Hazards
• Data Hazards
• Control Hazards
• Interrupts
• Multicycle operations
• Pipeline clocking

© 1998 by Hill, Wood, Sohi,
Smith and Vijaykumar and
Moshovos

ECE D52 Lecture Notes: Chapter 3

1

Sequential Execution Semantics
We will be studying techniques that exploit the semantics of
Sequential Execution.
Sequential Execution Semantics: instructions appear as if they executed in the program specified order and one after the other
Alternatively
At any given point in time we should be able to identify an instruction so that: 1. All preceding instructions have executed
2. None following has executed

© 1998 by Hill, Wood, Sohi,
Smith and Vijaykumar and
Moshovos

ECE D52 Lecture Notes: Chapter 3

2

Exploiting Sequential Semantics
• The “it should appear” is the key
• The only way one can inspect execution order is via the machine’s state
This includes registers, memory and any other named storage
We will looking at techniques that relax execution order while preserving sequential execution semantics

© 1998 by Hill, Wood, Sohi,
Smith and Vijaykumar and
Moshovos

ECE D52 Lecture Notes: Chapter 3

3

Steps of Instruction Execution
Instruction execution is not a monolithic action

Fetch
Decode

There are multiple microactions involved

Read Operands
Operation
Writeback Result
Determine Next Instruction
© 1998 by Hill, Wood, Sohi,
Smith and Vijaykumar and
Moshovos

ECE D52 Lecture Notes: Chapter 3

4

Pipelining: Partially Overlap Instructions
Unpipelined

time

1/Throughput

instructions latency Pipelined

1/Throughput

time instructions latency

Time sequential
Ideally: Time pipeline = ----------------------------------------PipelineDepth

This ignores fill and drain times
© 1998 by Hill, Wood, Sohi,
Smith and Vijaykumar and
Moshovos

ECE D52 Lecture Notes: Chapter 3

5

Sequential

You May Also Find These Documents Helpful

  • Satisfactory Essays

    SD1230 Lab 1

    • 239 Words
    • 2 Pages

    2. What type of instruction is used to execute different code based on a condition? -Jumps…

    • 239 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The second category of fault changes individual instructions in the text segment. These faults are intended to approximate the assembly-level manifestation of real C-level programming…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The operating systems job is managing the memory. The operating system is in charge of bringing this process into main memory (Stallings, 2012). However the processor must deal with references within the program. Branch instructions include an address to reference the order to be executed next. Data reference instructions include the address of the byte or word of data referenced. The processor hardware and operating system software must be able to translate the memory references found in the code of the program into actual physical memory addresses, reflecting the current location of the program in main memory. (Stallings, 2012).…

    • 573 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1&2 Discussion

    • 379 Words
    • 2 Pages

    Access control is typically achieved by reserving a collection of bits within the general “Flag Register” to indicate the current “access control level”. Certain instructions are restricted so that they are only legal if the “access control level” is at least some minimum value; otherwise the instruction generates an “illegal operation” interrupt.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Biology Exam Paper

    • 2143 Words
    • 9 Pages

    Using a technology called ____, a processor can begin executing an instruction before it completes the previous instruction.…

    • 2143 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    associated with this to recognize this and keep it in the memory, storage involve the changes…

    • 824 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Sheet01

    • 1045 Words
    • 5 Pages

    4. What is the result of the following code and where is it kept? LDAA #$15 ADDA #$13 5. Which of the following instructions is (are) illegal? a- LDAA #500 b- LDAA #50 c- LDAA #00 d- LDAA #$255 e- LDAA #$25 f- LDAA #$F5 g- ADDA mybyte , #$25 6. Which of the following instructions is (are) illegal? a- ADDA #$300 b- ADDA #$50 c- ADDA #$500 d- ADDA #$255 e- ADDA #12 f- ADDA#$F5 g- ADDA #$25 7. 8. 9. 10. Show a simple code to load values 30H and 97H into locations 805H and 806H, respectively. Show a simple code to load value 55H into locations 300H and 308H. Show a simple code to load value 5FH into Port B. Which of the following is an invalid use of the immediate addressing mode? a- LDDA #$24 b- LDAA $30 c- LDAA #$60…

    • 1045 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    1. The logical structure in which one instruction occurs after another with no branching is a ______A______.…

    • 765 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The expression 1 To 5 in the Case 1 To 5 clause specifies the range of numbers from ____.…

    • 595 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyp 3.2 1.1

    • 4895 Words
    • 20 Pages

    May need instructions repeated lots of time and may need instruction to be broken/ simplified.…

    • 4895 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Agent Installation Guide

    • 15121 Words
    • 61 Pages

    Agent Installation Guide 5.0 - Documentation Release 1 This document, as well as the software described in it, is confidential and contains proprietary information protected by non-disclosure agreements. No part of this document may be reproduced in any form or disclosed to any party not bound by a non-disclosure agreement without the express written consent of Absolute Software Corporation. Absolute Software Corporation reserves the right to revise this document and to periodically make changes in the content hereof without obligation of such revisions or changes unless required to do so by prior agreement. Information contained herein is believed to be correct, but is provided solely for guidance in product application and not as a warranty of any kind. Absolute Software Corporation assumes no responsibility for use of this information, nor for any infringements of patents or other rights of third parties resulting from the use of this information. Absolute Software Corporation, Suite 1600, Four Bentall Centre, 1055 Dunsmuir Street PO Box 49211 Vancouver, British Columbia, Canada V7X 1K8. ©2010 Absolute Software Corporation. All rights reserved. Computrace®, Computrace Mobile™ and Absolute are registered trademarks of Absolute Software Corporation. All other trademarks are property of their respective owners. Computrace US Patents #5,715,174, #5,764,892, #5,802,280, #5,896,497 #6,244,758, #6,269,392, #6,300,863, and #6,507 , ,914. Canadian Patents #2,205,370 and #2,284,806. U.K Patents #EP793823, and #GB2338101. German Patent #695 125 34.6-08. Australian patent #699045. Japanese Patent #JP4067035. The Trademarks BlackBerry®, RIM®, Electron™, Pearl™, Pearl Flip™, Storm™, Curve™ and Bold™ are owned by Research In Motion Limited and are registered in the United States and may be pending or registered in other countries. Absolute Software Inc. is not endorsed, sponsored, affiliated with or otherwise…

    • 15121 Words
    • 61 Pages
    Powerful Essays
  • Better Essays

    Pipeda

    • 1242 Words
    • 5 Pages

    The PIPEDA requires that any business that collects, uses or discloses personal information in the course of commercial activity establish privacy policies and practices based on the following ten privacy principles of the Canadian Standard Association’s Model Code for the Protection of Personal Information. This code was developed by Canadian businesses, academics, consumers and government through the Canadian Standards Association and has been incorporated as a schedule to PIPEDA.…

    • 1242 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Psychology

    • 371 Words
    • 2 Pages

    By remembering key aspects the program, the information will come naturally since you are the one that created it.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Steganography applications conceal information in other, seemingly innocent media. Steganographic results may masquerade as other file for data types, be concealed within various media, or even hidden in network traffic or disk space. We are only limited by our imagination in the many ways information and data can be exploited to conceal additional information.…

    • 2269 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Short for "Web log". A blog is an online journal or diary of an individual’s…

    • 3289 Words
    • 14 Pages
    Good Essays