ACA Mod2
ACA Mod2
ACA Mod2
• Thus the “future processor space” is moving toward the lower right
of the processor design space.
• Processor families mapped onto a coordinated space of clock rate
v/s CPI
o Clock Rates moved from lower
to higher speeds
o CPI rate is lowered
• Broad Categorization
o CISC
o RISC
CISC and RISC Processors
Complex Instruction Set Computing (CISC) processors like the Intel
80486, the Motorola 68040, the VAX/8600, and the IBM S/390
typically use micro programmed control units, have lower clock rates,
and higher CPI figures
Reduced Instruction Set Computing (RISC) processors like the Intel
i860, SPARC, MIPS R3000, and IBM RS/6000, which have hard-wired
control units, higher clock rates, and lower CPI figures
VLIW Machines
• Very Long Instruction Word machines typically have many
more functional units that superscalars (and thus the need for
longer – 256 to 1024 bits – instructions to provide control for
them).
Superscalar Pipelines
Superscalar processors were originally developed as an alternative to vector
processors, with a view to exploit higher degree of instruction level
parallelism.
A superscalar processor of degree m can issue m instructions per cycle.
• A vector is a one-dimensional array of data items (each of the same data type).
• Faster to access,
• Are smaller in capacity,
• Are more expensive per byte,
• Have a higher bandwidth, and
• Have a smaller unit of transfer
• Peripheral Technology
• Peripheral devices include printers, plotters, terminals, monitors,
graphics displays, optical scanners, image digitizers, output microfilm
devices etc.
• Some I/O devices are tied to special-purpose or multimedia applications.
Inclusion, Coherence, and Locality
• Information stored in a memory hierarchy (M1, M2,…, Mn) satisfies 3 important properties:
– Inclusion
– Coherence
– Locality
• The inverse, however, is not necessarily true. That is, the presence of a
data item in level Mi+1 does not imply its presence in level Mi. We call a
reference to a missing item a “miss.”
The Coherence Property
The requirement that copies of data items at successive memory levels
be consistent is called the “coherence property.”
Write-through
As soon as a data item in Mi is modified, immediate update of the
corresponding data item(s) in Mi+1, Mi+2, … Mn is required.
This is the most aggressive (and expensive) strategy.
Write-back
The update of the data item in Mi+1 corresponding to a modified
item in Mi is not updated unit it (or the block/page/etc. in Mi that
contains it) is replaced or removed.
This is the most efficient approach, but cannot be used (without
modification) when multiple processors share Mi+1, …, Mn.
Locality of References
Memory references are generated by the CPU for either instruction or
data access.
• Otherwise (when it is not found), it is called a miss (and the item must be
obtained from a lower level in the hierarchy).
• The hit ratio, h, for Mi is the probability (between 0 and 1) that a needed data
item is found when sought in level memory Mi.
• We assume h0 = 0 and hn = 1.
Access Frequencies
• The access frequency fi to level Mi is
(1-h1) (1-h2) … hi.
• This implies that the cost is distributed over n levels. Since cl > c2 > c3 > … cn, we
have to choose s1 < s2 < s3 < … sn.
•
• The optimal design of a memory hierarchy should result in a T eff close to the t1 of M1
and a total cost close to the cost of Mn.