Upload
lekhue
View
217
Download
1
Embed Size (px)
Citation preview
EECC550 - ShaabanEECC550 - Shaaban#1 Final Review Winter 2000 2-19-2001
CPU OrganizationCPU Organization• Datapath Design:
– Capabilities & performance characteristics of principalFunctional Units (FUs):
– (e.g., Registers, ALU, Shifters, Logic Units, ...)
– Ways in which these components are interconnected (busesconnections, multiplexors, etc.).
– How information flows between components.
• Control Unit Design:– Logic and means by which such information flow is controlled.
– Control and coordination of FUs operation to realize the targetedInstruction Set Architecture to be implemented (can either beimplemented using a finite state machine or a microprogram).
• Hardware description with a suitable language, possiblyusing Register Transfer Notation (RTN).
EECC550 - ShaabanEECC550 - Shaaban#2 Final Review Winter 2000 2-19-2001
Hierarchy of Computer ArchitectureHierarchy of Computer Architecture
I/O systemInstr. Set Proc.
Compiler
OperatingSystem
Application
Digital DesignCircuit Design
Instruction Set Architecture
Firmware
Datapath & Control
Layout
Software
Hardware
Software/Hardware Boundary
High-Level Language Programs
Assembly LanguagePrograms
Microprogram
Register TransferNotation (RTN)
Logic Diagrams
Circuit Diagrams
Machine Language Program
EECC550 - ShaabanEECC550 - Shaaban#3 Final Review Winter 2000 2-19-2001
• For a specific program compiled to run on a specific machine“A”, the following parameters are provided:
– The total instruction count of the program.– The average number of cycles per instruction (average CPI).– Clock cycle of machine “A”
• How can one measure the performance of this machine running thisprogram?
– Intuitively the machine is said to be faster or has betterperformance running this program if the total execution time isshorter.
– Thus the inverse of the total measured program execution time isa possible performance measure or metric:
PerformanceA = 1 / Execution TimeA
How to compare performance of different machines?
What factors affect performance? How to improve performance?
Computer Performance Measures:Computer Performance Measures:Program Execution TimeProgram Execution Time
EECC550 - ShaabanEECC550 - Shaaban#4 Final Review Winter 2000 2-19-2001
CPU Execution Time: The CPU EquationCPU Execution Time: The CPU Equation• A program is comprised of a number of instructions
– Measured in: instructions/program
• The average instruction takes a number of cycles perinstruction (CPI) to be completed.– Measured in: cycles/instruction
• CPU has a fixed clock cycle time = 1/clock rate– Measured in: seconds/cycle
• CPU execution time is the product of the above threeparameters as follows:
CPU time = Seconds = Instructions x Cycles x Seconds
Program Program Instruction Cycle
CPU time = Seconds = Instructions x Cycles x Seconds
Program Program Instruction Cycle
EECC550 - ShaabanEECC550 - Shaaban#5 Final Review Winter 2000 2-19-2001
Factors Affecting CPU PerformanceFactors Affecting CPU PerformanceCPU time = Seconds = Instructions x Cycles x Seconds
Program Program Instruction Cycle
CPU time = Seconds = Instructions x Cycles x Seconds Program Program Instruction Cycle
CPI Clock RateInstruction Count
Program
Compiler
Organization
Technology
Instruction SetArchitecture (ISA)
X
X
X
X
X
X
X X
X
EECC550 - ShaabanEECC550 - Shaaban#6 Final Review Winter 2000 2-19-2001
Aspects of CPU Execution TimeAspects of CPU Execution TimeCPU Time = Instruction count x CPI x Clock cycle
Instruction CountInstruction Count
ClockClockCycleCycle
CPICPIDepends on:
CPU OrganizationTechnology
Depends on:
Program Used
CompilerISACPU Organization
Depends on:
Program UsedCompilerISA
EECC550 - ShaabanEECC550 - Shaaban#7 Final Review Winter 2000 2-19-2001
Instruction Types & CPI: An ExampleInstruction Types & CPI: An Example• An instruction set has three instruction classes:
• Two code sequences have the following instruction counts:
• CPU cycles for sequence 1 = 2 x 1 + 1 x 2 + 2 x 3 = 10 cycles
CPI for sequence 1 = clock cycles / instruction count
= 10 /5 = 2
• CPU cycles for sequence 2 = 4 x 1 + 1 x 2 + 1 x 3 = 9 cycles
CPI for sequence 2 = 9 / 6 = 1.5
Instruction class CPI A 1 B 2 C 3
Instruction counts for instruction classCode Sequence A B C 1 2 1 2 2 4 1 1
EECC550 - ShaabanEECC550 - Shaaban#8 Final Review Winter 2000 2-19-2001
Instruction Frequency & CPIInstruction Frequency & CPI• Given a program with n types or classes of
instructions with the following characteristics:
Ci = Count of instructions of typei
CPIi = Average cycles per instruction of typei
Fi = Frequency of instruction typei
= Ci/ total instruction count
Then:
( )∑=
×=n
iii FCPICPI
1
EECC550 - ShaabanEECC550 - Shaaban#9 Final Review Winter 2000 2-19-2001
Instruction Type Frequency & CPI:Instruction Type Frequency & CPI:A RISC ExampleA RISC Example
Typical Mix
Base Machine (Reg / Reg)Op Freq Cycles CPI(i) % TimeALU 50% 1 .5 23%Load 20% 5 1.0 45%Store 10% 3 .3 14%Branch 20% 2 .4 18%
CPI = .5 x 1 + .2 x 5 + .1 x 3 + .2 x 2 = 2.2
( )∑=
×=n
iii FCPICPI
1
EECC550 - ShaabanEECC550 - Shaaban#10 Final Review Winter 2000 2-19-2001
Metrics of Computer PerformanceMetrics of Computer Performance
Compiler
Programming Language
Application
DatapathControl
Transistors Wires Pins
ISA
Function UnitsCycles per second (clock rate).
Megabytes per second.
Execution time: Target workload,SPEC95, etc.
Each metric has a purpose, and each can be misused.
(millions) of Instructions per second – MIPS(millions) of (F.P.) operations per second – MFLOP/s
EECC550 - ShaabanEECC550 - Shaaban#11 Final Review Winter 2000 2-19-2001
Performance Enhancement Calculations:Performance Enhancement Calculations: Amdahl's Law Amdahl's Law
• The performance enhancement possible due to a given designimprovement is limited by the amount that the improved feature is used
• Amdahl’s Law:
Performance improvement or speedup due to enhancement E:
Execution Time without E Performance with E Speedup(E) = -------------------------------------- = --------------------------------- Execution Time with E Performance without E
– Suppose that enhancement E accelerates a fraction F of theexecution time by a factor S and the remainder of the time isunaffected then:
Execution Time with E = ((1-F) + F/S) X Execution Time without EHence speedup is given by:
Execution Time without E 1Speedup(E) = --------------------------------------------------------- = -------------------- ((1 - F) + F/S) X Execution Time without E (1 - F) + F/S
Note: All fractions here refer to original execution time.
EECC550 - ShaabanEECC550 - Shaaban#12 Final Review Winter 2000 2-19-2001
Pictorial Depiction of Amdahl’s LawPictorial Depiction of Amdahl’s Law
Before: Execution Time without enhancement E:
Unaffected, fraction: (1- F)
After: Execution Time with enhancement E:
Enhancement E accelerates fraction F of execution time by a factor of S
Affected fraction: F
Unaffected, fraction: (1- F) F/S
Unchanged
Execution Time without enhancement E 1Speedup(E) = ------------------------------------------------------ = ------------------ Execution Time with enhancement E (1 - F) + F/S
EECC550 - ShaabanEECC550 - Shaaban#13 Final Review Winter 2000 2-19-2001
Amdahl's Law With Multiple Enhancements:Amdahl's Law With Multiple Enhancements:ExampleExample
• Three CPU performance enhancements are proposed with the followingspeedups and percentage of the code execution time affected:
Speedup1 = S1 = 10 Percentage1 = F1 = 20%
Speedup2 = S2 = 15 Percentage1 = F2 = 15%
Speedup3 = S3 = 30 Percentage1 = F3 = 10%
• While all three enhancements are in place in the new design, eachenhancement affects a different portion of the code and only oneenhancement can be used at a time.
• What is the resulting overall speedup?
• Speedup = 1 / [(1 - .2 - .15 - .1) + .2/10 + .15/15 + .1/30)] = 1 / [ .55 + .0333 ] = 1 / .5833 = 1.71
∑ ∑+−=
i ii
ii S
FFSpeedup
)( )1
1
(
EECC550 - ShaabanEECC550 - Shaaban#14 Final Review Winter 2000 2-19-2001
MIPS Instruction FormatsMIPS Instruction Formats
• op: Opcode, operation of the instruction.
• rs, rt, rd: The source and destination register specifiers.
• shamt: Shift amount.
• funct: selects the variant of the operation in the “op” field.
• address / immediate: Address offset or immediate value.
• target address: Target address of the jump instruction.
op target address
02631
6 bits 26 bits
op rs rt rd shamt funct
061116212631
6 bits 6 bits5 bits5 bits5 bits5 bits
op rs rt immediate
016212631
6 bits 16 bits5 bits5 bits
R-Type
I-Type: ALULoad/Store, Branch
J-Type: Jumps
EECC550 - ShaabanEECC550 - Shaaban#15 Final Review Winter 2000 2-19-2001
A Single Cycle MIPS A Single Cycle MIPS Datapath Datapathim
m16
32
ALUctr
Clk
busW
RegWr
3232
busA
32busB
55 5
Rw Ra Rb32 32-bitRegisters
Rs
Rt
Rt
RdRegDst
Exten
der
Mu
x
3216imm16
ALUSrcExtOp
Mu
x
MemtoReg
Clk
Data InWrEn32 Adr
DataMemory
MemWrA
LU
Equal
Instruction<31:0>
0
1
0
1
01
<21:25>
<16:20>
<11:15>
<0:15>
Imm16RdRtRs
=
Ad
der
Ad
der
PC
Clk
00
Mu
x
4
nPC_sel
PC
Ext
Adr
InstMemory
EECC550 - ShaabanEECC550 - Shaaban#16 Final Review Winter 2000 2-19-2001
RegDst ALUctrALUSrc MemtoReg Equal
Instruction<31:0>
<21:25>
<16:20>
<11:15>
<0:15>
Imm16RdRsRt
Adr
InstructionMemory
DATA PATHDATA PATH
ExtOp MemWr
Control UnitControl Unit
Op
<21:25>
Fun
nPC_sel RegWr
<0:25>
Jump_target
Jump
EECC550 - ShaabanEECC550 - Shaaban#17 Final Review Winter 2000 2-19-2001
The Truth Table For The Main ControlThe Truth Table For The Main Control
R-type ori lw sw beq jump
RegDst
ALUSrc
MemtoReg
RegWrite
MemWrite
Branch
Jump
ExtOp
ALUop (Symbolic)
1
0
0
1
0
0
0
x
“R-type”
0
1
0
1
0
0
0
0
Or
0
1
1
1
0
0
0
1
Add
x
1
x
0
1
0
0
1
Add
x
0
x
0
0
1
0
x
Subtract
x
x
x
0
0
0
1
x
xxx
op 00 0000 00 1101 10 0011 10 1011 00 0100 00 0010
ALUop <2> 1 0 0 0 0 x
ALUop <1> 0 1 0 0 0 x
ALUop <0> 0 0 0 0 1 x
EECC550 - ShaabanEECC550 - Shaaban#18 Final Review Winter 2000 2-19-2001
Clk
PC
Rs, Rt, Rd,Op, Func
Clk-to-Q
ALUctr
Instruction Memoey Access Time
Old Value New Value
RegWr Old Value New Value
Delay through Control Logic
busARegister File Access Time
Old Value New Value
busB
ALU Delay
Old Value New Value
Old Value New Value
New ValueOld Value
ExtOp Old Value New Value
ALUSrc Old Value New Value
MemtoReg Old Value New Value
Address Old Value New Value
busW Old Value New
Delay through Extender & Mux
RegisterWrite Occurs
Data Memory Access Time
Worst Case Timing (Load)Worst Case Timing (Load)
EECC550 - ShaabanEECC550 - Shaaban#19 Final Review Winter 2000 2-19-2001
MIPS Single Cycle InstructionMIPS Single Cycle InstructionTiming ComparisonTiming Comparison
PC Inst Memory mux ALU Data Mem mux
PC Reg FileInst Memory mux ALU mux
PC Inst Memory mux ALU Data Mem
PC Inst Memory cmp mux
Reg File
Reg File
Reg File
Arithmetic & Logical
Load
Store
Branch
Critical Path
setup
setup
EECC550 - ShaabanEECC550 - Shaaban#20 Final Review Winter 2000 2-19-2001
CPU Design StepsCPU Design Steps1. Analyze instruction set operations using independent
RTN => datapath requirements.
2. Select set of datapath components & establish clockmethodology.
3. Assemble datapath meeting the requirements.
4. Analyze implementation of each instruction to determinesetting of control points that effects the register transfer.
5. Assemble the control logic.
EECC550 - ShaabanEECC550 - Shaaban#21 Final Review Winter 2000 2-19-2001
Drawback of Single Cycle ProcessorDrawback of Single Cycle Processor
• Long cycle time.
• All instructions must take as much time as the slowest:– Cycle time for load is longer than needed for all other
instructions.
• Real memory is not as well-behaved as idealized memory– Cannot always complete data access in one (short) cycle.
EECC550 - ShaabanEECC550 - Shaaban#22 Final Review Winter 2000 2-19-2001
Reducing Cycle Time: Multi-Cycle DesignReducing Cycle Time: Multi-Cycle Design• Cut combinational dependency graph by inserting registers / latches.
• The same work is done in two or more fast cycles, rather than one slowcycle.
storage element
Acyclic CombinationalLogic
storage element
storage element
Acyclic CombinationalLogic (A)
storage element
storage element
Acyclic CombinationalLogic (B)
=>
EECC550 - ShaabanEECC550 - Shaaban#23 Final Review Winter 2000 2-19-2001
Instruction Processing CyclesInstruction Processing Cycles
Obtain instruction from program storage
Determine instruction type
Obtain operands from registers
Compute result value or status
Store result in register/memory if needed
(usually called Write Back).
Update program counter to address
of next instruction} Common
steps for all instructions
Instruction
Fetch
Instruction
Decode
Execute
Result
Store
Next
Instruction
EECC550 - ShaabanEECC550 - Shaaban#24 Final Review Winter 2000 2-19-2001
Partitioning The Single Cycle DatapathPartitioning The Single Cycle DatapathAdd registers between smallest steps
PC
Nex
t P
C
Ope
rand
Fet
ch Exec Re
g.
File
Mem
Acc
ess
Dat
aM
em
Inst
ruct
ion
Fet
ch
Res
ult S
tore
AL
Uct
r
Reg
Dst
AL
USr
c
Ext
Op
Mem
Wr
nPC
_sel
Reg
Wr
Mem
Wr
Mem
Rd
EECC550 - ShaabanEECC550 - Shaaban#25 Final Review Winter 2000 2-19-2001
Example Multi-cycle DatapathExample Multi-cycle Datapath
PC
Nex
t P
C
Ope
rand
Fet
ch
Ext
ALU Re
g.
File
Mem
Acc
ess
Dat
aM
em
Inst
ruct
ion
Fet
ch
Res
ult S
tore
AL
Uct
r
Reg
Dst
AL
USr
c
Ext
Op
nPC
_sel
Reg
Wr
Mem
Wr
Mem
Rd
IR
A
B
R
M
RegFile
Mem
ToR
eg
Equ
al
Registers added:
IR: Instruction registerA, B: Two registers to hold operands read from register file.R: or ALUOut, holds the output of the ALUM: or Memory data register (MDR) to hold data read from data memory
EECC550 - ShaabanEECC550 - Shaaban#26 Final Review Winter 2000 2-19-2001
Operations In Each CycleOperations In Each Cycle
Instruction Fetch
Instruction Decode
Execution
Memory
WriteBack
R-Type
IR ← ← Mem[PC]
A ←← R[rs]
B ← ← R[rt]
R ←← A + B
R[rd] ← ← R
PC ← ← PC + 4
Logic Immediate
IR ←← Mem[PC]
A ←← R[rs]
R ← ← A OR ZeroExt[imm16]
R[rt] ← ← R PC ← ← PC + 4
Load
IR ←← Mem[PC]
A ←← R[rs]
R ← ← A + SignEx(Im16)
M ← ← Mem[R]
R[rd] ← ← MPC ← ← PC + 4
Store
IR ← ← Mem[PC]
A ←← R[rs]
B ← ← R[rt]
R ←← A + SignEx(Im16)
Mem[R] ←← B
PC ← ← PC + 4
Branch
IR ←← Mem[PC]
A ←← R[rs]
B ← ← R[rt]
If Equal = 1
PC ←← PC + 4 +
(SignExt(imm16) x4)
else
PC ←← PC + 4
EECC550 - ShaabanEECC550 - Shaaban#27 Final Review Winter 2000 2-19-2001
Finite State Machine (FSM) Control ModelFinite State Machine (FSM) Control Model
• State specifies control points for Register Transfer.
• Transfer occurs upon exiting state (same falling edge).
State X
Register TransferControl Points
Depends on Input
Control State
Next StateLogic
Output Logic
inputs (conditions)
outputs (control points)
EECC550 - ShaabanEECC550 - Shaaban#28 Final Review Winter 2000 2-19-2001
Control Specification For Multi-cycle CPUControl Specification For Multi-cycle CPUFinite State Machine (FSM)Finite State Machine (FSM)
IR ←← MEM[PC]
R-type
A ←← R[rs]B ←← R[rt]
R ← ← A fun B
R[rd] ← ← RPC ←← PC + 4
R ← ← A or ZX
R[rt] ←← RPC ← ← PC + 4
ORi
R ← ← A + SX
R[rt] ←← MPC ←← PC + 4
M ← ← MEM[R]
LW
R ← ← A + SX
MEM[R] ←← BPC ← ← PC + 4
BEQ & Equal
BEQ & ~Equal
PC ←← PC + 4 PC ← ← PC + SX || 00
SW
“instruction fetch”
“decode / operand fetch”
Exe
cute
Mem
ory
Wri
te-b
ack
To instruction fetch
To instruction fetchTo instruction fetch
EECC550 - ShaabanEECC550 - Shaaban#29 Final Review Winter 2000 2-19-2001
Traditional FSM ControllerTraditional FSM Controller
datapath + state diagram => controldatapath + state diagram => control
• Translate RTN statements intocontrol points.
• Assign states.
• Implement the controller.
EECC550 - ShaabanEECC550 - Shaaban#30 Final Review Winter 2000 2-19-2001
Mapping Mapping RTNsRTNs To Control Points Examples To Control Points Examples& State Assignments& State Assignments
IR ← ← MEM[PC]
0000
R-type
A ←← R[rs]B ←← R[rt] 0001
R ← ← A fun B 0100
R[rd] ← ← RPC ←← PC + 4
0101
R ← ← A or ZX 0110
R[rt] ←← RPC ← ← PC + 4
0111
ORi
R ← ← A + SX 1000
R[rt] ←← MPC ←← PC + 4
1010
M ← ← MEM[S] 1001
LW
R ← ← A + SX 1011
MEM[S] ←← BPC ← ← PC + 4 1100
BEQ & Equal
BEQ & ~Equal
PC ←← PC + 4 0011
PC ← ← PC + SX || 00 0010
SW
“instruction fetch”
“decode / operand fetch”
Exe
cute
Mem
ory
Wri
te-b
ack
imem_rd, IRen
Aen, Ben
ALUfun, Sen
RegDst,RegWr,PCen To instruction fetch
state 0000
To instruction fetch state 0000To instruction fetch state 0000
EECC550 - ShaabanEECC550 - Shaaban#31 Final Review Winter 2000 2-19-2001
Detailed Control SpecificationState Op field Eq Next IR PC Ops Exec Mem Write-Back
en sel A B Ex Sr ALU S R W M M-R Wr Dst0000 ?????? ? 0001 10001 BEQ 0 0011 1 10001 BEQ 1 0010 1 10001 R-type x 0100 1 10001 orI x 0110 1 10001 LW x 1000 1 10001 SW x 1011 1 10010 xxxxxx x 0000 1 10011 xxxxxx x 0000 1 00100 xxxxxx x 0101 0 1 fun 10101 xxxxxx x 0000 1 0 0 1 10110 xxxxxx x 0111 0 0 or 10111 xxxxxx x 0000 1 0 0 1 01000 xxxxxx x 1001 1 0 add 11001 xxxxxx x 1010 1 0 01010 xxxxxx x 0000 1 0 1 1 01011 xxxxxx x 1100 1 0 add 11100 xxxxxx x 0000 1 0 0 1
R
EECC550 - ShaabanEECC550 - Shaaban#32 Final Review Winter 2000 2-19-2001
Alternative Multiple Cycle Datapath (In Textbook)
•Shared instruction/data memory unit• A single ALU shared among instructions• Shared units require additional or widened multiplexors• Temporary registers to hold data between clock cycles of the instruction:
• Additional registers: Instruction Register (IR), Memory Data Register (MDR), A, B, ALUOut
EECC550 - ShaabanEECC550 - Shaaban#33 Final Review Winter 2000 2-19-2001
Operations In Each CycleOperations In Each Cycle
Instruction Fetch
Instruction Decode
Execution
Memory
WriteBack
R-Type
IR ← ← Mem[PC]PC ←← PC + 4
A ←← R[rs]
B ← ← R[rt]
ALUout ←← PC +(SignExt(imm16)x4)
ALUout ←← A + B
R[rd] ← ← ALUout
Logic Immediate
IR ←← Mem[PC]PC ←← PC + 4
A ←← R[rs]
B ← ← R[rt]
ALUout ←← PC +
(SignExt(imm16) x4)
ALUout ← ←
A OR ZeroExt[imm16]
R[rt] ← ← ALUout
Load
IR ←← Mem[PC]PC ←← PC + 4
A ←← R[rs]
B ← ← R[rt]
ALUout ←← PC +
(SignExt(imm16) x4)
ALUout ← ←
A + SignEx(Im16)
M ← ← Mem[ALUout]
R[rd] ← ← Mem
Store
IR ← ← Mem[PC]PC ←← PC + 4
A ←← R[rs]
B ← ← R[rt]
ALUout ←← PC +
(SignExt(imm16) x4)
ALUout ←←
A + SignEx(Im16)
Mem[ALUout] ←← B
Branch
IR ←← Mem[PC]PC ←← PC + 4
A ←← R[rs]
B ← ← R[rt]
ALUout ←← PC +
(SignExt(imm16) x4)
If Equal = 1
PC ← ← ALUout
EECC550 - ShaabanEECC550 - Shaaban#34 Final Review Winter 2000 2-19-2001
Finite State Machine (FSM) Specification Finite State Machine (FSM) SpecificationIR ← MEM[PC]PC ← PC + 4
R-type
ALUout ← A fun B
R[rd] ← ALUout
ALUout ← A op ZX
R[rt] ← ALUout
ORiALUout
← A + SX
R[rt] ← M
M ← MEM[ALUout]
LW
ALUout ← A + SX
MEM[ALUout] ← B
SW
“instruction fetch”
“decode”
Exe
cute
Mem
ory
Writ
e-ba
ck
0000
0001
0100
0101
0110
0111
1000
1001
1010
1011
1100
BEQ
0010
If A = B thenPC ← ALUout
A ← R[rs]B ← R[rt]
ALUout ← ← PC +SX
To instruction fetch
To instruction fetchTo instruction fetch
EECC550 - ShaabanEECC550 - Shaaban#35 Final Review Winter 2000 2-19-2001
MIPS Multi-cycle DatapathMIPS Multi-cycle DatapathPerformance EvaluationPerformance Evaluation
• What is the average CPI?– State diagram gives CPI for each instruction type
– Workload below gives frequency of each type
Type CPIi for type Frequency CPIi x freqIi
Arith/Logic 4 40% 1.6
Load 5 30% 1.5
Store 4 10% 0.4
branch 3 20% 0.6
Average CPI: 4.1
Better than CPI = 5 if all instructions took the same number of clock cycles (5).
EECC550 - ShaabanEECC550 - Shaaban#36 Final Review Winter 2000 2-19-2001
• Control may be designed using one of several initial representations. Thechoice of sequence control, and how logic is represented, can then bedetermined independently; the control can then be implemented with oneof several methods using a structured logic technique.
Initial Representation Finite State Diagram Microprogram
Sequencing Control Explicit Next State Microprogram counter Function + Dispatch ROMs
Logic Representation Logic Equations Truth Tables
Implementation PLA ROMTechnique “hardwired control” “microprogrammed control”
Control Implementation AlternativesControl Implementation Alternatives
EECC550 - ShaabanEECC550 - Shaaban#37 Final Review Winter 2000 2-19-2001
MicroprogrammedMicroprogrammed Control Control• Finite state machine control for a full set of instructions is very
complex, and may involve a very large number of states:– Slight microoperation changes require new FSM controller.
• Microprogramming: Designing the control as a program thatimplements the machine instructions.
• A microprogam for a given machine instruction is a symbolicrepresentation of the control involved in executing the instructionand is comprised of a sequence of microinstructions.
•
• Each microinstruction defines the set of datapath control signalsthat must asserted (active) in a given state or cycle.
• The format of the microinstructions is defined by a number offields each responsible for asserting a set of control signals.
• Microarchitecture:– Logical structure and functional capabilities of the hardware as
seen by the microprogrammer.
EECC550 - ShaabanEECC550 - Shaaban#38 Final Review Winter 2000 2-19-2001
Types of “branching”• Set state to 0 (fetch)• Dispatch i (state 1)• Use incremented address (seq) state number 2
Opcode
State Reg
Microinstruction Address
Inputs
Outputs Control Signal Fields
Microprogram Storage
ROM/PLA
MulticycleDatapath
1
Address Select Logic
Adder
MicroprogramCounter, MicroPC
SequencingControlField
Microprogrammed Microprogrammed Control UnitControl Unit
EECC550 - ShaabanEECC550 - Shaaban#39 Final Review Winter 2000 2-19-2001
List of control Signals Grouped Into FieldsList of control Signals Grouped Into FieldsSignal name Effect when deasserted Effect when asserted
ALUSelA 1st ALU operand = PC 1st ALU operand = Reg[rs]RegWrite None Reg. is writtenMemtoReg Reg. write data input = ALU Reg. write data input = memoryRegDst Reg. dest. no. = rt Reg. dest. no. = rdMemRead None Memory at address is read,
MDR ←← Mem[addr]MemWrite None Memory at address is writtenIorD Memory address = PC Memory address = SIRWrite None IR ←← MemoryPCWrite None PC ←← PCSourcePCWriteCond None IF ALUzero then PC ←← PCSourcePCSource PCSource = ALU PCSource = ALUout
Sing
le B
it C
ontr
ol
Signal name Value EffectALUOp 00 ALU adds 01 ALU subtracts 10 ALU does function code
11 ALU does logical ORALUSelB 000 2nd ALU input = Reg[rt] 001 2nd ALU input = 4 010 2nd ALU input = sign extended IR[15-0] 011 2nd ALU input = sign extended, shift left 2 IR[15-0]
100 2nd ALU input = zero extended IR[15-0]
Mul
tiple
Bit
Con
trol
EECC550 - ShaabanEECC550 - Shaaban#40 Final Review Winter 2000 2-19-2001
MicroinstructionMicroinstruction Field Values Field ValuesField Name Values for Field Function of Field with Specific ValueALU Add ALU adds
Subt. ALU subtractsFunc code ALU does function codeOr ALU does logical OR
SRC1 PC 1st ALU input = PCrs 1st ALU input = Reg[rs]
SRC2 4 2nd ALU input = 4Extend 2nd ALU input = sign ext. IR[15-0]Extend0 2nd ALU input = zero ext. IR[15-0]Extshft 2nd ALU input = sign ex., sl IR[15-0]rt 2nd ALU input = Reg[rt]
destination rd ALU Reg[rd] ←← ALUoutrt ALU Reg[rt] ←← ALUout
rt Mem Reg[rt] ←← MemMemory Read PC Read memory using PC
Read ALU Read memory using ALU outputWrite ALU Write memory using ALU output, value B
Memory register IR IR ←← MemPC write ALU PC ←← ALU
ALUoutCond IF ALU Zero then PC ←← ALUoutSequencing Seq Go to sequential µinstruction
Fetch Go to the first microinstructionDispatch i Dispatch using ROM.
EECC550 - ShaabanEECC550 - Shaaban#41 Final Review Winter 2000 2-19-2001
MicroprogramMicroprogram for The Control Unit for The Control UnitLabel ALU SRC1 SRC2 Dest. Memory Mem. Reg. PC Write Sequencing
Fetch: Add PC 4 Read PC IR ALU SeqAdd PC Extshft Dispatch
Lw: Add rs Extend SeqRead ALU Seq
rt MEM Fetch
Sw: Add rs Extend SeqWrite ALU Fetch
Rtype: Func rs rt Seqrd ALU Fetch
Beq: Subt. rs rt ALUoutCond. Fetch
Ori: Or rs Extend0 Seqrt ALU Fetch
EECC550 - ShaabanEECC550 - Shaaban#42 Final Review Winter 2000 2-19-2001
MIPS Integer ALU RequirementsMIPS Integer ALU Requirements
00 add
01 addU
02 sub
03 subU
04 and
05 or
06 xor
07 nor
12 slt
13 sltU
(1) Functional Specification:
inputs: 2 x 32-bit operands A, B, 4-bit modeoutputs: 32-bit result S, 1-bit carry, 1 bit overflow, 1 bit zerooperations: add, addu, sub, subu, and, or, xor, nor, slt, sltU
(2) Block Diagram:
ALUALUA B
movf
S
32 32
32
4c
10 operations thus 4 control bits
zero
EECC550 - ShaabanEECC550 - Shaaban#43 Final Review Winter 2000 2-19-2001
Building Block: 1-bit ALUBuilding Block: 1-bit ALU
A
B
Mu
x
CarryIn
Result
1-bitFull
Adder
CarryOut
add
and
or
invertBOperation
Performs: AND, OR, addition on A, B or A, B inverted
EECC550 - ShaabanEECC550 - Shaaban#44 Final Review Winter 2000 2-19-2001
32-Bit ALU Using 32 1-Bit 32-Bit ALU Using 32 1-Bit ALUsALUs
32-bit rippled-carry adder (operation/invertB lines not shown)
A31
B31
1-bitALU
Result31
A0
B0
1-bitALU
Result0
CarryIn0
CarryOut0
A1
B1
1-bitALU
Result1
CarryIn1
CarryOut1
A2
B2
1-bitALU
Result2
CarryIn2
CarryIn3
CarryOut31
::
CarryOut30CarryIn31
C
Addition/Subtraction Performance:
Assume gate delay = T
Total delay = 32 x (1-Bit ALU Delay) = 32 x 2 x gate delay = 64 x gate delay = 64 T
EECC550 - ShaabanEECC550 - Shaaban#45 Final Review Winter 2000 2-19-2001
MIPS ALU With SLT Support AddedMIPS ALU With SLT Support Added
A311-bitALU
B31 Result31
B0 1-bitALU
A0Result0
CarryIn0
CarryOut0
A1B1
1-bitALU
Result1
CarryIn1
CarryOut1
A2B2 1-bit
ALUResult2
CarryIn2
CarryIn3
CarryOut31
::
CarryOut30CarryIn31
C
::::
Zero
Overflow
Less = 0
Less = 0
Less = 0
Less
EECC550 - ShaabanEECC550 - Shaaban#46 Final Review Winter 2000 2-19-2001
Improving ALU Performance:Carry Look Ahead (CLA)
A B C-out0 0 0 “kill”0 1 C-in “propagate”1 0 C-in “propagate”1 1 1 “generate”
A0
B1
SGP
G = A and BP = A xor B
A
B
SGP
A
B
SGP
A
B
SGP
Cin
C1 =G0 + C0 • P0
C2 = G1 + G0 • P1 + C0 • P0 • P1
C3 = G2 + G1 C3 = G2 + G1 • • • • P2 + G0 P2 + G0 •••• P1 P1 •••• P2 + C0 P2 + C0 •••• P0 P0 •••• P1 P1 •••• P2 P2
GP
EECC550 - ShaabanEECC550 - Shaaban#47 Final Review Winter 2000 2-19-2001
Cascaded Carry Look-aheadCascaded Carry Look-ahead16-Bit Example16-Bit ExampleC
LA
4-bitAdder
4-bitAdder
4-bitAdder
C1 =G0 + C0 •• P0
C2 = G1 + G0 • • P1 + C0 •• P0 •• P1
C3 = G2 + G1 • • P2 + G0 •• P1 •• P2 + C0 •• P0 •• P1 •• P2GP
G0P0
C4 = . . .
C0
Delay = 2 + 2 + 1 = 5 gate delays = 5T
Assuming allgates haveequal delay T
{
EECC550 - ShaabanEECC550 - Shaaban#48 Final Review Winter 2000 2-19-2001
Unsigned Multiplication ExampleUnsigned Multiplication Example• Paper and pencil example (unsigned):
Multiplicand 1000 Multiplier 1001
1000 0000 0000
1000Product 01001000
• m bits x n bits = m + n bit product, m = 32, n = 32, 64 bit product.
• The binary number system simplifies multiplication:
0 => place 0 ( 0 x multiplicand).
1 => place a copy ( 1 x multiplicand).
• We will examine 4 versions of multiplication hardware & algorithm:
–Successive refinement of design.
EECC550 - ShaabanEECC550 - Shaaban#49 Final Review Winter 2000 2-19-2001
Operation of Operation of CombinationalCombinational Multiplier Multiplier
B0
A0A1A2A3
A0A1A2A3
A0A1A2A3
A0A1A2A3
B1
B2
B3
P0P1P2P3P4P5P6P7
0 0 0 00 0 0
• At each stage shift A left ( x 2).
• Use next bit of B to determine whether to add in shifted multiplicand.
• Accumulate 2n bit partial product at each stage.
EECC550 - ShaabanEECC550 - Shaaban#50 Final Review Winter 2000 2-19-2001
MULTIPLY HARDWARE Version 3MULTIPLY HARDWARE Version 3
Product (Multiplier)
Multiplicand
32-bit ALU
WriteControl
32 bits
64 bits
Shift Right
• Combine Multiplier register and Product register:
– 32-bit Multiplicand register.
– 32 -bit ALU.
– 64-bit Product register, (0-bit Multiplier register).
EECC550 - ShaabanEECC550 - Shaaban#51 Final Review Winter 2000 2-19-2001
Multiply AlgorithmMultiply AlgorithmVersion 3Version 3
DoneYes: 32 repetitions
2. Shift the Product register right 1 bit.
No: < 32 repetitions
1. TestProduct0
Product0 = 0Product0 = 1
1a. Add multiplicand to the left half of product & place the result in the left half of Product register
32nd repetition?
Start
EECC550 - ShaabanEECC550 - Shaaban#52 Final Review Winter 2000 2-19-2001
CombinationalCombinational Shifter from Shifter from MUXes MUXes
1 0sel
A B
D
Basic Building Block
8-bit right shifter
1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
S2 S1 S0A0A1A2A3A4A5A6A7
R0R1R2R3R4R5R6R7
• What comes in the MSBs?
• How many levels for 32-bit shifter?
EECC550 - ShaabanEECC550 - Shaaban#53 Final Review Winter 2000 2-19-2001
DivisionDivision 1001 Quotient
Divisor 1000 1001010 Dividend–1000 10 101 1010 –1000 10 Remainder (or Modulo result)
• See how big a number can be subtracted, creating quotient bit on each step:
Binary => 1 * divisor or 0 * divisor
Dividend = Quotient x Divisor + Remainder => | Dividend | = | Quotient | + | Divisor |
• 3 versions of divide, successive refinement
EECC550 - ShaabanEECC550 - Shaaban#54 Final Review Winter 2000 2-19-2001
Remainder (Quotient)
Divisor
32-bit ALU
WriteControl
32 bits
64 bits
Shift Left“HI” “LO”
• 32-bit Divisor register.
• 32 -bit ALU.
• 64-bit Remainder regegister (0-bit Quotient register).
DIVIDE HARDWARE Version 3DIVIDE HARDWARE Version 3
EECC550 - ShaabanEECC550 - Shaaban#55 Final Review Winter 2000 2-19-2001
3b. Restore the original value by adding the Divisor register to the left half of the Remainderregister, &place the sum in the left half of the Remainder register. Also shift the Remainder register to the left, setting the new least significant bit to 0.
Test Remainder
Remainder < 0Remainder >= 0
2. Subtract the Divisor register from the left half of the Remainder register, & place the result in the left half of the Remainder register.
3a. Shift the Remainder register to the left setting the new rightmost bit to 1.
1. Shift the Remainder register left 1 bit.
Done. Shift left half of Remainder right 1 bit.
Yes: n repetitions (n = 4 here)
nthrepetition?
No: < n repetitions
Start: Place Dividend in RemainderDivide Algorithm Divide Algorithm Version 3Version 3
EECC550 - ShaabanEECC550 - Shaaban#56 Final Review Winter 2000 2-19-2001
Representation of Floating Point Numbers inRepresentation of Floating Point Numbers in
Single PrecisionSingle Precision IEEE 754 StandardIEEE 754 Standard
Example: 0 = 0 00000000 0 . . . 0 -1.5 = 1 01111111 10 . . . 0
Magnitude of numbers that can be represented is in the range: 2
-126(1.0) to 2
127 (2 - 2-23 )
Which is approximately: 1.8 x 10- 38 to 3.40 x 10 38
0 < E < 255Actual exponent is: e = E - 127
1 8 23sign
exponent:excess 127binary integeradded
mantissa:sign + magnitude, normalizedbinary significand with a hidden integer bit: 1.M
E MS
Value = N = (-1)S X 2 E-127 X (1.M)
EECC550 - ShaabanEECC550 - Shaaban#57 Final Review Winter 2000 2-19-2001
Representation of Floating Point Numbers inRepresentation of Floating Point Numbers in
Single PrecisionSingle Precision IEEE 754 StandardIEEE 754 Standard
Example: 0 = 0 00000000 0 . . . 0 -1.5 = 1 01111111 10 . . . 0
Magnitude of numbers that can be represented is in the range: 2
-126(1.0) to 2
127 (2 - 2-23 )
Which is approximately: 1.8 x 10- 38 to 3.40 x 10 38
0 < E < 255Actual exponent is: e = E - 127
1 8 23sign
exponent:excess 127binary integeradded
mantissa:sign + magnitude, normalizedbinary significand with a hidden integer bit: 1.M
E MS
Value = N = (-1)S X 2 E-127 X (1.M)
EECC550 - ShaabanEECC550 - Shaaban#58 Final Review Winter 2000 2-19-2001
Representation of Floating Point Numbers inRepresentation of Floating Point Numbers in
Double PrecisionDouble Precision IEEE 754 StandardIEEE 754 Standard
Example: 0 = 0 00000000000 0 . . . 0 -1.5 = 1 01111111111 10 . . . 0
Magnitude of numbers that can be represented is in the range: 2
-1022 (1.0) to 2
1023 (2 - 2 - 52 )
Which is approximately: 2.23 x 10- 308 to 1.8 x 10 308
0 < E < 2047Actual exponent is: e = E - 1023
1 11 52sign
exponent:excess 1023binary integeradded
Mantissa:sign + magnitude, normalizedbinary significand with a hidden integer bit: 1.M
E MS
Value = N = (-1)S X 2 E-1023 X (1.M)
EECC550 - ShaabanEECC550 - Shaaban#59 Final Review Winter 2000 2-19-2001
Floating Point Conversion ExampleFloating Point Conversion Example• The decimal number -2345.12510 is to be represented in the
IEEE 754 32-bit single precision format:
-2345.12510 = -100100101001.0012 (converted to binary)
= -1.00100101001001 x 211 (normalized binary)
• The mantissa is negative so the sign S is given by:
S = 1
• The biased exponent E is given by E = e + 127
E = 11 + 127 = 13810 = 100010102
• Fractional part of mantissa M:
M = .00100101001001000000000 (in 23 bits)
The IEEE 754 single precision representation is given by:
1 10001010 00100101001001000000000
S E M
1 bit 8 bits 23 bits
Hidden
EECC550 - ShaabanEECC550 - Shaaban#60 Final Review Winter 2000 2-19-2001
Floating PointFloating Point Addition Addition Flowchart Flowchart
Start
Normalize the sum, either shifting right andincrementing the exponent or shifting leftand decrementing the exponent
Compare the exponents of the two numbersshift the smaller number to the right until itsexponent matches the larger exponent
Round the significand to the appropriate number of bitsIf mantissa = 0, set exponent to 0
Add the significands (mantissas)
Done
Overflow orUnderflow ?
Generate exception or return error
(1)
(2)
(3)
(4)
(5)
Stillnormalized?
Yes
No
yes
No
EECC550 - ShaabanEECC550 - Shaaban#61 Final Review Winter 2000 2-19-2001
Floating Point Addition Hardware
EECC550 - ShaabanEECC550 - Shaaban#62 Final Review Winter 2000 2-19-2001
Overflow or Underflow?
Floating PointFloating PointMultiplication FlowchartMultiplication Flowchart
(1)
(2)
(3)
(5)
(6)
Start
Done
Is one/both operands =0?
Set the result to zero: exponent = 0
Multiply the mantissas
Compute sign of result: Xs XOR Ys
Round or truncate the result mantissa
Compute exponent: biased exp.(X) + biased exp.(Y) - bias
Generate exception or return error
Normalize mantissa if needed
(4)
StillNormalized?
(7)
Yes
NoNo
Yes
EECC550 - ShaabanEECC550 - Shaaban#63 Final Review Winter 2000 2-19-2001
Extra Bits for RoundingExtra Bits for RoundingExtra bits used to prevent or minimize rounding errors.
How many extra bits?
IEEE: As if computed the result exactly and rounded.
Addition:
1.xxxxx 1.xxxxx 1.xxxxx
+ 1.xxxxx 0.001xxxxx 0.01xxxxx
1x.xxxxy 1.xxxxxyyy 1x.xxxxyyy
post-normalization pre-normalization pre and post
• Guard Digits: digits to the right of the first p digits of significand to guardagainst loss of digits – can later be shifted left into first P places duringnormalization.
• Addition: carry-out shifted in
• Subtraction: borrow digit and guard
• Multiplication: carry and guard, Division requires guard
EECC550 - ShaabanEECC550 - Shaaban#64 Final Review Winter 2000 2-19-2001
Rounding DigitsRounding DigitsNormalized result, but some non-zero digits to the right of the significand --> the number should be rounded
E.g., B = 10, p = 3: 0 2 1.69
0 0 7.85
0 2 1.61
= 1.6900 * 10
= - .0785 * 10
= 1.6115 * 10
2-bias
2-bias
2-bias-
One round digit must be carried to the right of the guard digit so thatafter a normalizing left shift, the result can be rounded, accordingto the value of the round digit.
IEEE Standard: four rounding modes: round to nearest (default)
round towards plus infinityround towards minus infinityround towards 0
round to nearest: round digit < B/2 then truncate > B/2 then round up (add 1 to ULP: unit in last place) = B/2 then round to nearest even digit
it can be shown that this strategy minimizes the mean error introduced by rounding.
EECC550 - ShaabanEECC550 - Shaaban#65 Final Review Winter 2000 2-19-2001
Sticky BitSticky BitAdditional bit to the right of the round digit to better fine tune rounding
d0 . d1 d2 d3 . . . dp-1 0 0 0 0 . 0 0 X . . . X X X S X X S
Sticky bit: set to 1 if any 1 bits fall off the end of the round digit
d0 . d1 d2 d3 . . . dp-1 0 0 0 0 . 0 0 X . . . X X X 0
d0 . d1 d2 d3 . . . dp-1 0 0 0 0 . 0 0 X . . . X X X 1
generates a borrow
Rounding Summary:
Radix 2 minimizes wobble in precision.
Normal operations in +,-,*,/ require one carry/borrow bit + one guard digit.
One round digit needed for correct rounding.
Sticky bit needed when round digit is B/2 for max accuracy.
Rounding to nearest has mean error = 0 if uniform distribution of digitsare assumed.
EECC550 - ShaabanEECC550 - Shaaban#66 Final Review Winter 2000 2-19-2001
Pipelining: Design GoalsPipelining: Design Goals• The length of the machine clock cycle is determined by the time
required for the slowest pipeline stage.
• An important pipeline design consideration is to balance thelength of each pipeline stage.
• If all stages are perfectly balanced, then the time perinstruction on a pipelined machine (assuming ideal conditionswith no stalls):
Time per instruction on unpipelined machine Number of pipe stages
• Under these ideal conditions:– Speedup from pipelining = the number of pipeline stages = k
– One instruction is completed every cycle: CPI = 1 .
EECC550 - ShaabanEECC550 - Shaaban#67 Final Review Winter 2000 2-19-2001
Pipelined Instruction ProcessingPipelined Instruction ProcessingRepresentationRepresentation
Clock cycle Number Time in clock cycles →Instruction Number 1 2 3 4 5 6 7 8 9
Instruction I IF ID EX MEM WB
Instruction I+1 IF ID EX MEM WB
Instruction I+2 IF ID EX MEM WB
Instruction I+3 IF ID EX MEM WB
Instruction I +4 IF ID EX MEM WB
Time to fill the pipeline
Pipeline Stages:
IF = Instruction Fetch
ID = Instruction Decode
EX = Execution
MEM = Memory Access
WB = Write Back
First instruction, ICompleted
Last instruction, I+4 completed
EECC550 - ShaabanEECC550 - Shaaban#68 Final Review Winter 2000 2-19-2001
For 1000 instructions, execution time:
• Single Cycle Machine:
– 8 ns/cycle x 1 CPI x 1000 inst = 8000 ns
• Multicycle Machine:
– 2 ns/cycle x 4.6 CPI (due to inst mix) x 1000 inst = 9200 ns
• Ideal pipelined machine, 5-stages:
– 2 ns/cycle x (1 CPI x 1000 inst + 4 cycle fill) = 2008 ns
Single Cycle, Multi-Cycle, Pipeline:Single Cycle, Multi-Cycle, Pipeline:Performance Comparison ExamplePerformance Comparison Example
EECC550 - ShaabanEECC550 - Shaaban#69 Final Review Winter 2000 2-19-2001
Single Cycle, Multi-Cycle, Vs. PipelineSingle Cycle, Multi-Cycle, Vs. Pipeline
Clk
Cycle 1
Multiple Cycle Implementation:
IF ID EX MEM WB
Cycle 2 Cycle 3 Cycle 4 Cycle 5 Cycle 6 Cycle 7 Cycle 8 Cycle 9 Cycle 10
IF ID EX MEM
Load Store
Clk
Single Cycle Implementation:
Load Store Waste
IF
R-type
Load IF ID EX MEM WB
Pipeline Implementation:
IF ID EX MEM WBStore
IF ID EX MEM WBR-type
Cycle 1 Cycle 2
8 ns
2ns
EECC550 - ShaabanEECC550 - Shaaban#70 Final Review Winter 2000 2-19-2001
MIPS: A Pipelined DatapathMIPS: A Pipelined Datapath
Instructionmemory
Address
4
32
0
Add Addresult
Shiftleft 2
Ins t
ruct
ion
IF/ID EX/MEM MEM/WB
Mux
0
1
Add
PC
0
Address
Wri tedata
Mux
1Registers
Readdata 1
Readdata 2
Readregister 1
Readregister 2
16Sign
extend
Writeregister
Writedata
Readdata
Datamemory
1
ALUresult
Mux
ALUZero
ID/EX
IF ID EX MEM WBInstruction Fetch Instruction Decode Execution Memory Write Back
EECC550 - ShaabanEECC550 - Shaaban#71 Final Review Winter 2000 2-19-2001
Pipeline ControlPipeline Control• Pass needed control signals along from one stage to the next as the
instruction travels through the pipeline just like the data
Execution/Address Calculation stage control lines
Memory access stage control lines
Write-back stage control
lines
InstructionReg Dst
ALU Op1
ALU Op0
ALU Src Branch
Mem Read
Mem Write
Reg write
Mem to Reg
R-format 1 1 0 0 0 0 0 1 0lw 0 0 0 1 0 1 0 1 1sw X 0 0 1 0 0 1 0 Xbeq X 0 1 0 1 0 0 0 X
Control
EX
M
WB
M
WB
WB
IF/ID ID/EX EX/MEM MEM/WB
Instruction
EECC550 - ShaabanEECC550 - Shaaban#72 Final Review Winter 2000 2-19-2001
Basic Performance Issues In PipeliningBasic Performance Issues In Pipelining• Pipelining increases the CPU instruction throughput: The number of instructions completed per unit time. Under ideal condition instruction throughput is one instruction per machine cycle, or CPI = 1
• Pipelining does not reduce the execution time of anindividual instruction: The time needed to complete allprocessing steps of an instruction (also called instructioncompletion latency).
• It usually slightly increases the execution time of eachinstruction over unpipelined implementations due to theincreased control overhead of the pipeline and pipelinestage registers delays.
EECC550 - ShaabanEECC550 - Shaaban#73 Final Review Winter 2000 2-19-2001
Pipelining Performance ExamplePipelining Performance Example• Example: For an unpipelined machine:
– Clock cycle = 10ns, 4 cycles for ALU operations and branches and 5 cycles formemory operations with instruction frequencies of 40%, 20% and 40%,respectively.
– If pipelining adds 1ns to the machine clock cycle then the speedup ininstruction execution from pipelining is:
Non-pipelined Average instruction execution time = Clock cycle x Average CPI
= 10 ns x ((40% + 20%) x 4 + 40%x 5) = 10 ns x 4.4 = 44 ns
In the pipelined five implementation five stages are used withan average instruction execution time of: 10 ns + 1 ns = 11 ns
Speedup from pipelining = Instruction time unpipelined
Instruction time pipelined
= 44 ns / 11 ns = 4 times
EECC550 - ShaabanEECC550 - Shaaban#74 Final Review Winter 2000 2-19-2001
Pipeline HazardsPipeline Hazards• Hazards are situations in pipelining which prevent the next
instruction in the instruction stream from executing duringthe designated clock cycle resulting in one or more stall cycles.
• Hazards reduce the ideal speedup gained from pipelining andare classified into three classes:
– Structural hazards: Arise from hardware resource conflictswhen the available hardware cannot support all possiblecombinations of instructions.
– Data hazards: Arise when an instruction depends on theresults of a previous instruction in a way that is exposed bythe overlapping of instructions in the pipeline.
– Control hazards: Arise from the pipelining of conditionalbranches and other instructions that change the PC.
EECC550 - ShaabanEECC550 - Shaaban#75 Final Review Winter 2000 2-19-2001
Structural hazard Example: Single Memory For Instructions & Data
Mem
Instr.
Order
Time (clock cycles)
Load
Instr 1
Instr 2
Instr 3
Instr 4A
LUMem Reg Mem Reg
AL
UMem Reg Mem Reg
AL
UMem Reg Mem Reg
AL
UReg Mem Reg
AL
UMem Reg Mem Reg
Detection is easy in this case (right half highlight means read, left half write)
EECC550 - ShaabanEECC550 - Shaaban#76 Final Review Winter 2000 2-19-2001
Data Hazards ExampleData Hazards Example• Problem with starting next instruction before first is
finished
– Data dependencies here that “go backward in time”create data hazards.
sub $2, $1, $3and $12, $2, $5or $13, $6, $2add $14, $2, $2sw $15, 100($2)
IM Reg
IM Reg
CC 1 CC 2 CC 3 CC 4 CC 5 CC 6
Time (in clock cycles)
sub $2, $1, $3
Programexecutionorder(in instructions)
and $12, $2, $5
IM Reg DM Reg
IM DM Reg
IM DM Reg
CC 7 CC 8 CC 9
10 10 10 10 10/–20 –20 –20 – 20 – 20
or $13, $6, $2
add $14, $2, $2
sw $15, 100($2)
Value of register $2:
DM Reg
Reg
Reg
Reg
DM
EECC550 - ShaabanEECC550 - Shaaban#77 Final Review Winter 2000 2-19-2001
Data Hazard Resolution: Stall CyclesData Hazard Resolution: Stall CyclesStall the pipeline by a number of cycles.The control unit must detect the need to insert stall cycles.
In this case two stall cycles are needed.
IM Reg
IM
CC 1 CC 2 CC 3 CC 4 CC 5 CC 6
Time (in clock cycles)
sub $2, $1, $3
Programexecutionorder(in instructions)
and $12, $2, $5
CC 7 CC 8
10 10 10 10 10/– 20 – 20 – 20 – 20
CC 9
– 20
or $13, $6, $2
add $14, $2, $2
sw $15, 100($2)
Value of register $2:
DM Reg
Reg
IM Reg DM Reg
IM DM Reg
IM DM Reg
Reg
Reg
Reg
DMSTALL STALL
CC 10
– 20
CC 11
– 20
STALL STALL
EECC550 - ShaabanEECC550 - Shaaban#78 Final Review Winter 2000 2-19-2001
Data Hazard Resolution: Stall CyclesData Hazard Resolution: Stall CyclesStall the pipeline by a number of cycles.The control unit must detect the need to insert stall cycles.
In this case two stall cycles are needed.
IM Reg
IM
CC 1 CC 2 CC 3 CC 4 CC 5 CC 6
Time (in clock cycles)
sub $2, $1, $3
Programexecutionorder(in instructions)
and $12, $2, $5
CC 7 CC 8
10 10 10 10 10/– 20 – 20 – 20 – 20
CC 9
– 20
or $13, $6, $2
add $14, $2, $2
sw $15, 100($2)
Value of register $2:
DM Reg
Reg
IM Reg DM Reg
IM DM Reg
IM DM Reg
Reg
Reg
Reg
DMSTALL STALL
CC 10
– 20
CC 11
– 20
STALL STALL
EECC550 - ShaabanEECC550 - Shaaban#79 Final Review Winter 2000 2-19-2001
Performance of Pipelines with StallsPerformance of Pipelines with Stalls• Hazards in pipelines may make it necessary to stall the
pipeline by one or more cycles and thus degradingperformance from the ideal CPI of 1.
CPI pipelined = Ideal CPI + Pipeline stall clock cycles per instruction
• If pipelining overhead is ignored and we assume that the stages areperfectly balanced then:
Speedup = CPI unpipelined / (1 + Pipeline stall cycles per instruction)
• When all instructions take the same number of cycles and is equal tothe number of pipeline stages then:
Speedup = Pipeline depth / (1 + Pipeline stall cycles per instruction)
EECC550 - ShaabanEECC550 - Shaaban#80 Final Review Winter 2000 2-19-2001
Data Hazard Resolution: ForwardingData Hazard Resolution: Forwarding– Register file forwarding to handle read/write to same register
– ALU forwarding
EECC550 - ShaabanEECC550 - Shaaban#81 Final Review Winter 2000 2-19-2001
Data Hazard Example With ForwardingData Hazard Example With Forwarding
IM Reg
IM Reg
CC 1 CC 2 CC 3 CC 4 CC 5 CC 6
Time (in clock cycles)
sub $2, $1, $3
Programexecution order(in instructions)
and $12, $2, $5
IM Reg DM Reg
IM DM Reg
IM DM Reg
CC 7 CC 8 CC 9
10 10 10 10 10/– 20 – 20 – 20 –20 –20
or $13, $6, $2
add $14, $2, $2
sw $15, 100($2)
Value of register $2 :
DM Reg
Reg
Reg
Reg
X X X –20 X X X X XValue of EX/MEM :X X X X – 20 X X X XValue of MEM/WB :
DM
EECC550 - ShaabanEECC550 - Shaaban#82 Final Review Winter 2000 2-19-2001
A Data Hazard Requiring A StallA Data Hazard Requiring A Stall
Reg
IM
Reg
Reg
IM
CC 1 CC 2 CC 3 CC 4 CC 5 CC 6
Time (in clock cycles)
lw $2, 20($1)
Programexecutionorder(in instructions)
and $4, $2, $5
IM Reg DM Reg
IM DM Reg
IM DM Reg
CC 7 CC 8 CC 9
or $8, $2, $6
add $9, $4, $2
slt $1, $6, $7
DM Reg
Reg
Reg
DM
A load followed by an R-type instruction that uses the loaded value
Even with forwarding in place a stall cycle is neededThis condition must be detected by hardware
EECC550 - ShaabanEECC550 - Shaaban#83 Final Review Winter 2000 2-19-2001
Compiler Scheduling ExampleCompiler Scheduling Example• Reorder the instructions to avoid as many pipeline stalls as possible:
lw $15, 0($2)lw $16, 4($2)sw $16, 0($2)sw $15, 4($2)
• The data hazard occurs on register $16 between the second lw and the first swresulting in a stall cycle
• With forwarding we need to find only one independent instructions to placebetween them, swapping the lw instructions works:
lw $15, 0($2)lw $16, 4($2)nopnopsw $15, 0($2)sw $16, 4($2)
• Without forwarding we need three independent instructions to place betweenthem, so in addition two nops are added.
lw $15, 0($2)lw $16, 4($2)sw $15, 0($2)sw $16, 4($2)
EECC550 - ShaabanEECC550 - Shaaban#84 Final Review Winter 2000 2-19-2001
Control Hazards: ExampleControl Hazards: Example• Three other instructions are in the pipeline before branch
instruction target decision is made when BEQ is in MEM stage.
• In the above diagram, we are predicting “branch not taken”– Need to add hardware for flushing the three following instructions if
we are wrong losing three cycles.
Reg
Reg
CC 1
Time (in clock cycles)
40 beq $1, $3, 7
Programexecutionorder(in instructions)
IM Reg
IM DM
IM DM
IM DM
DM
DM Reg
Reg Reg
Reg
Reg
RegIM
44 and $12, $2, $5
48 or $13, $6, $2
52 add $14, $2, $2
72 lw $4, 50($7)
CC 2 CC 3 CC 4 CC 5 CC 6 CC 7 CC 8 CC 9
Reg
EECC550 - ShaabanEECC550 - Shaaban#85 Final Review Winter 2000 2-19-2001
Reducing Delay of Taken BranchesReducing Delay of Taken Branches• Next PC of a branch known in MEM stage: Costs three lost cycles if taken.• If next PC is known in EX stage, one cycle is saved.• Branch address calculation can be moved to ID stage using a register comparator, costing
only one cycle if branch is taken.
PCInstruc tion
m emory
4
R egisters
Mux
Mux
Mux
ALU
EX
M
WB
M
WB
WB
ID/EX
0
EX/MEM
MEM/WB
Datamemory
Mux
H azarddetection
unit
Forw ardingunit
IF.Flush
IF/ID
Signextend
C ontrol
Mux
=
Shif tlef t 2
Mux
EECC550 - ShaabanEECC550 - Shaaban#86 Final Review Winter 2000 2-19-2001
Pipeline Performance ExamplePipeline Performance Example• Assume the following MIPS instruction mix:
• What is the resulting CPI for the pipelined MIPS withforwarding and branch address calculation in ID stage?
• CPI = Ideal CPI + Pipeline stall clock cycles per instruction
= 1 + stalls by loads + stalls by branches
= 1 + .3x.25x1 + .2 x .45x1
= 1 + .075 + .09
= 1.165
Type FrequencyArith/Logic 40%Load 30% of which 25% are followed immediately by an instruction using the loaded valueStore 10%branch 20% of which 45% are taken
EECC550 - ShaabanEECC550 - Shaaban#87 Final Review Winter 2000 2-19-2001
Memory Hierarchy: MotivationMemory Hierarchy: MotivationProcessor-Memory (DRAM) Performance GapProcessor-Memory (DRAM) Performance Gap
µProc60%/yr.
DRAM7%/yr.
1
10
100
100019
8019
81
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
DRAM
CPU
1982
Processor-MemoryPerformance Gap:(grows 50% / year)
Per
form
ance
EECC550 - ShaabanEECC550 - Shaaban#88 Final Review Winter 2000 2-19-2001
Processor-DRAM Performance Gap Impact:Processor-DRAM Performance Gap Impact:
Example Example
• To illustrate the performance impact, assume a pipelined RISCCPU with CPI = 1 using non-ideal memory.
• Over an 10 year period, ignoring other factors, the cost of a fullmemory access in terms of number of wasted instructions:
CPU CPU Memory Minimum CPU cycles or Year speed cycle Access instructions wasted MHZ ns ns
1986: 8 125 190 190/125 = 1.51988: 33 30 175 175/30 = 5.81991: 75 13.3 155 155/13.3 = 11.651994: 200 5 130 130/5 = 261996: 300 3.33 100 110/3.33 = 33
EECC550 - ShaabanEECC550 - Shaaban#89 Final Review Winter 2000 2-19-2001
Memory Hierarchy: MotivationMemory Hierarchy: Motivation
The Principle Of LocalityThe Principle Of Locality• Programs usually access a relatively small portion of their
address space (instructions/data) at any instant of time(program working set).
• Two Types of locality:
– Temporal Locality: If an item is referenced, it will tend tobe referenced again soon.
– Spatial locality: If an item is referenced, items whoseaddresses are close will tend to be referenced soon.
• The presence of locality in program behavior, makes itpossible to satisfy a large percentage of program access needsusing memory levels with much less capacity than programaddress space.
EECC550 - ShaabanEECC550 - Shaaban#90 Final Review Winter 2000 2-19-2001
Levels of The Memory HierarchyLevels of The Memory Hierarchy
Part of The On-chipCPU Datapath 16-256 Registers
One or more levels (Static RAM):Level 1: On-chip 16-64K Level 2: On or Off-chip 128-512KLevel 3: Off-chip 128K-8M
Registers
Cache
Main Memory
Magnetic Disc
Optical Disk or Magnetic Tape
Farther away from The CPU
Lower Cost/Bit
Higher Capacity
Increased AccessTime/Latency
Lower ThroughputDynamic RAM (DRAM) 16M-16G
Interface:SCSI, RAID, IDE, 13944G-100G
EECC550 - ShaabanEECC550 - Shaaban#91 Final Review Winter 2000 2-19-2001
Cache Design & Operation IssuesCache Design & Operation Issues• Q1: Where can a block be placed cache?
(Block placement strategy & Cache organization)– Fully Associative, Set Associative, Direct Mapped
• Q2: How is a block found if it is in cache?(Block identification)– Tag/Block
• Q3: Which block should be replaced on a miss?(Block replacement)– Random, LRU
• Q4: What happens on a write?(Cache write policy)– Write through, write back
EECC550 - ShaabanEECC550 - Shaaban#92 Final Review Winter 2000 2-19-2001
Cache Organization ExampleCache Organization Example
EECC550 - ShaabanEECC550 - Shaaban#93 Final Review Winter 2000 2-19-2001
Locating A Data Block in CacheLocating A Data Block in Cache• Each block frame in cache has an address tag.
• The tags of every cache block that might contain the required dataare checked or searched in parallel.
• A valid bit is added to the tag to indicate whether this entry containsa valid address.
• The address from the CPU to cache is divided into:
– A block address, further divided into:
• An index field to choose a block set in cache.
(no index field when fully associative).
• A tag field to search and match addresses in the selected set.
– A block offset to select the data from the block.
Block Address BlockOffsetTag Index
EECC550 - ShaabanEECC550 - Shaaban#94 Final Review Winter 2000 2-19-2001
Address Field SizesAddress Field Sizes
Block Address BlockOffsetTag Index
Block offset size = log2(block size)
Index size = log2(Total number of blocks/associativity)
Tag size = address size - index size - offset sizeTag size = address size - index size - offset size
Physical Address Generated by CPU
EECC550 - ShaabanEECC550 - Shaaban#95 Final Review Winter 2000 2-19-2001
Four-Way Set Associative Cache:Four-Way Set Associative Cache:MIPS Implementation ExampleMIPS Implementation Example
Address
22 8
V TagIndex
0
1
2
253
254
255
Data V Tag Data V Tag Data V Tag Data
3222
4- to-1 m ultiplexo r
Hit Da ta
123891011123 031 0
IndexField
TagField
256 sets1024 block frames
EECC550 - ShaabanEECC550 - Shaaban#96 Final Review Winter 2000 2-19-2001
Cache Organization/Addressing ExampleCache Organization/Addressing Example
• Given the following:– A single-level L1 cache with 128 cache block frames
• Each block frame contains four words (16 bytes)
– 16-bit memory addresses to be cached (64K bytes main memoryor 4096 memory blocks)
• Show the cache organization/mapping and cacheaddress fields for:
• Fully Associative cache.
• Direct mapped cache.
• 2-way set-associative cache.
EECC550 - ShaabanEECC550 - Shaaban#97 Final Review Winter 2000 2-19-2001
Cache Example: Fully Associative CaseCache Example: Fully Associative Case
Block offset = 4 bits
Block Address = 12 bits
Tag = 12 bits
All 128 tags mustbe checked in parallelby hardware to locate a data block
V
V
V
Valid bit
EECC550 - ShaabanEECC550 - Shaaban#98 Final Review Winter 2000 2-19-2001
Cache Example: Direct Mapped CaseCache Example: Direct Mapped Case
Block offset = 4 bits
Block Address = 12 bits
Tag = 5 bits Index = 7 bits Main Memory
Only a single tag mustbe checked in parallelto locate a data block
V
Valid bit
V
V
V
EECC550 - ShaabanEECC550 - Shaaban#99 Final Review Winter 2000 2-19-2001
Block offset = 4 bits
Block Address = 12 bits
Tag = 6 bits Index = 6 bits
Cache Example: 2-Way Set-AssociativeCache Example: 2-Way Set-Associative
Main Memory
Two tags in a set mustbe checked in parallelto locate a data block
Valid bits not shown
EECC550 - ShaabanEECC550 - Shaaban#100 Final Review Winter 2000 2-19-2001
Cache Replacement PolicyCache Replacement Policy• When a cache miss occurs the cache controller may have to
select a block of cache data to be removed from a cache blockframe and replaced with the requested data, such a block isselected by one of two methods:
– Random:• Any block is randomly selected for replacement providing
uniform allocation.
• Simple to build in hardware.
• The most widely used cache replacement strategy.
– Least-recently used (LRU):• Accesses to blocks are recorded and and the block
replaced is the one that was not used for the longest periodof time.
• LRU is expensive to implement, as the number of blocksto be tracked increases, and is usually approximated.
EECC550 - ShaabanEECC550 - Shaaban#101 Final Review Winter 2000 2-19-2001
Miss Rates for Caches with Different Size,Miss Rates for Caches with Different Size,Associativity & Replacement AlgorithmAssociativity & Replacement Algorithm
Sample DataSample Data
Associativity: 2-way 4-way 8-way
Size LRU Random LRU Random LRU Random
16 KB 5.18% 5.69% 4.67% 5.29% 4.39% 4.96%
64 KB 1.88% 2.01% 1.54% 1.66% 1.39% 1.53%
256 KB 1.15% 1.17% 1.13% 1.13% 1.12% 1.12%
EECC550 - ShaabanEECC550 - Shaaban#102 Final Review Winter 2000 2-19-2001
Single Level Cache PerformanceSingle Level Cache PerformanceFor a CPU with a single level (L1) of cache and no stalls for
cache hits:
CPU time = (CPU execution clock cycles +
Memory stall clock cycles) x clock cycle time
Memory stall clock cycles = (Reads x Read miss rate x Read miss penalty) + (Writes x Write miss rate x Write miss penalty)
If write and read miss penalties are the same:
Memory stall clock cycles = Memory accesses x Miss rate x Miss penalty
With ideal memory
EECC550 - ShaabanEECC550 - Shaaban#103 Final Review Winter 2000 2-19-2001
Single Level Cache PerformanceSingle Level Cache PerformanceCPUtime = IC x CPI x C
CPIexecution = CPI with ideal memory
CPI = CPIexecution + Mem Stall cycles per instruction
CPUtime = IC x (CPIexecution + Mem Stall cycles per instruction) x C
Mem Stall cycles per instruction = Mem accesses per instruction x Miss rate x Miss penalty
CPUtime = IC x (CPIexecution + Mem accesses per instruction x Miss rate x Miss penalty ) x C
Misses per instruction = Memory accesses per instruction x Miss rate
CPUtime = IC x (CPIexecution + Misses per instruction x Miss penalty) x C
EECC550 - ShaabanEECC550 - Shaaban#104 Final Review Winter 2000 2-19-2001
Cache Performance ExampleCache Performance Example• Suppose a CPU executes at Clock Rate = 200 MHz (5 ns per cycle)
with a single level of cache.
• CPIexecution = 1.1
• Instruction mix: 50% arith/logic, 30% load/store, 20% control
• Assume a cache miss rate of 1.5% and a miss penalty of 50 cycles.
CPI = CPIexecution + mem stalls per instruction
Mem Stalls per instruction =
Mem accesses per instruction x Miss rate x Miss penalty
Mem accesses per instruction = 1 + .3 = 1.3
Mem Stalls per instruction = 1.3 x .015 x 50 = 0.975
CPI = 1.1 + .975 = 2.075
The ideal CPU with no misses is 2.075/1.1 = 1.88 times faster
Instruction fetch Load/store
EECC550 - ShaabanEECC550 - Shaaban#105 Final Review Winter 2000 2-19-2001
Cache Performance ExampleCache Performance Example• Suppose for the previous example we double the clock rate to
400 MHZ, how much faster is this machine, assuming similarmiss rate, instruction mix?
• Since memory speed is not changed, the miss penalty takesmore CPU cycles:
Miss penalty = 50 x 2 = 100 cycles.
CPI = 1.1 + 1.3 x .015 x 100 = 1.1 + 1.95 = 3.05
Speedup = (CPIold x Cold)/ (CPInew x Cnew)
= 2.075 x 2 / 3.05 = 1.36
The new machine is only 1.36 times faster rather than 2
times faster due to the increased effect of cache misses.
→ CPUs with higher clock rate, have more cycles per cache miss and more memory impact on CPI
EECC550 - ShaabanEECC550 - Shaaban#106 Final Review Winter 2000 2-19-2001
3 Levels of Cache3 Levels of Cache
CPU
L1 Cache
L2 Cache
L3 Cache
Main Memory
Hit Rate= H1, Hit time = 1 cycle
Hit Rate= H2, Hit time = T2 cycles
Hit Rate= H3, Hit time = T3
Memory access penalty, M
EECC550 - ShaabanEECC550 - Shaaban#107 Final Review Winter 2000 2-19-2001
CPUtime = IC x (CPIexecution + Mem Stall cycles per instruction) x CMem Stall cycles per instruction = Mem accesses per instruction x Stall cycles per access
• For a system with 3 levels of cache, assuming no penaltywhen found in L1 cache:
Stall cycles per memory access =
[miss rate L1] x [ Hit rate L2 x Hit time L2
+ Miss rate L2 x (Hit rate L3 x Hit time L3
+ Miss rate L3 x Memory access penalty) ] =
[1 - H1] x [ H2 x T2
+ ( 1-H2 ) x (H3 x (T2 + T3)
+ (1 - H3) x M) ]
3-Level Cache Performance3-Level Cache Performance
EECC550 - ShaabanEECC550 - Shaaban#108 Final Review Winter 2000 2-19-2001
Three Level Cache ExampleThree Level Cache Example• CPU with CPIexecution = 1.1 running at clock rate = 500 MHZ• 1.3 memory accesses per instruction.• L1 cache operates at 500 MHZ with a miss rate of 5%• L2 cache operates at 250 MHZ with miss rate 3%, (T2 = 2 cycles)• L3 cache operates at 100 MHZ with miss rate 1.5%, (T3 = 5 cycles)
• Memory access penalty, M= 100 cycles. Find CPI.
• With single L1, CPI = 1.1 + 1.3 x .05 x 100 = 7.6CPI = CPIexecution + Mem Stall cycles per instructionMem Stall cycles per instruction = Mem accesses per instruction x Stall cycles per access
Stall cycles per memory access = [1 - H1] x [ H2 x T2 + ( 1-H2 ) x (H3 x (T2 + T3)
+ (1 - H3) x M) ]
= [.05] x [ .97 x 2 + (.03) x ( .985 x (2+5)
+ .015 x 100)]
= .05 x [ 1.94 + .03 x ( 6.895 + 1.5) ]
= .05 x [ 1.94 + .274] = .11
• CPI = 1.1 + 1.3 x .11 = 1.24