Power Analysis of WEP Encryption Jack Kang Benjamin Lee CS252 Final Project Fall 2003.

Slides:



Advertisements
Similar presentations
DSPs Vs General Purpose Microprocessors
Advertisements

© 2009 IBM Corporation July, 2009 | PADTAD Chicago, Illinois A Proposal of Operation History Management System for Source-to-Source Optimization.
Software & Services Group, Developer Products Division Copyright© 2010, Intel Corporation. All rights reserved. *Other brands and names are the property.
CPE 731 Advanced Computer Architecture Instruction Level Parallelism Part I Dr. Gheith Abandah Adapted from the slides of Prof. David Patterson, University.
Thread Criticality Predictors for Dynamic Performance, Power, and Resource Management in Chip Multiprocessors Abhishek Bhattacharjee Margaret Martonosi.
DBMSs on a Modern Processor: Where Does Time Go? Anastassia Ailamaki Joint work with David DeWitt, Mark Hill, and David Wood at the University of Wisconsin-Madison.
Computer Architecture Instruction Level Parallelism Dr. Esam Al-Qaralleh.
EEE226 MICROPROCESSORBY DR. ZAINI ABDUL HALIM School of Electrical & Electronic Engineering USM.
Chia-Yen Hsieh Laboratory for Reliable Computing Microarchitecture-Level Power Management Iyer, A. Marculescu, D., Member, IEEE IEEE Transaction on VLSI.
Energy Evaluation Methodology for Platform Based System-On- Chip Design Hildingsson, K.; Arslan, T.; Erdogan, A.T.; VLSI, Proceedings. IEEE Computer.
On the Limits of Leakage Power Reduction in Caches Yan Meng, Tim Sherwood and Ryan Kastner UC, Santa Barbara HPCA-2005.
Energy Efficient Instruction Cache for Wide-issue Processors Alex Veidenbaum Information and Computer Science University of California, Irvine.
Instruction Set Architecture (ISA) for Low Power Hillary Grimes III Department of Electrical and Computer Engineering Auburn University.
Techniques for Efficient Processing in Runahead Execution Engines Onur Mutlu Hyesoon Kim Yale N. Patt.
Optimization Of Power Consumption For An ARM7- BASED Multimedia Handheld Device Hoseok Chang; Wonchul Lee; Wonyong Sung Circuits and Systems, ISCAS.
Restrictive Compression Techniques to Increase Level 1 Cache Capacity Prateek Pujara Aneesh Aggarwal Dept of Electrical and Computer Engineering Binghamton.
Architectural Power Management for High Leakage Technologies Department of Electrical and Computer Engineering Auburn University, Auburn, AL /15/2011.
Author: D. Brooks, V.Tiwari and M. Martonosi Reviewer: Junxia Ma
Architectural and Compiler Techniques for Energy Reduction in High-Performance Microprocessors Nikolaos Bellas, Ibrahim N. Hajj, Fellow, IEEE, Constantine.
COM181 Computer Hardware Ian McCrumRoom 5B18,
Adaptive Video Coding to Reduce Energy on General Purpose Processors Daniel Grobe Sachs, Sarita Adve, Douglas L. Jones University of Illinois at Urbana-Champaign.
Spring 2000, 4/27/00 Power evaluation of SmartDust remote sensors CS 252 Project Presentation Robert Szewczyk Andras Ferencz.
CCSE251 Introduction to Computer Organization
CuMAPz: A Tool to Analyze Memory Access Patterns in CUDA
ParaScale : Exploiting Parametric Timing Analysis for Real-Time Schedulers and Dynamic Voltage Scaling Sibin Mohan 1 Frank Mueller 1,William Hawkins 2,
Low-Power Wireless Sensor Networks
Software Pipelining for Stream Programs on Resource Constrained Multi-core Architectures IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEM 2012 Authors:
INTRODUCTION Crusoe processor is 128 bit microprocessor which is build for mobile computing devices where low power consumption is required. Crusoe processor.
Drowsy Caches: Simple Techniques for Reducing Leakage Power Authors: ARM Ltd Krisztián Flautner, Advanced Computer Architecture Lab, The University of.
Thread Criticality Predictors for Dynamic Performance, Power, and Resource Management in Chip Multiprocessors Abhishek Bhattacharjee and Margaret Martonosi.
1 of 20 Phase-based Cache Reconfiguration for a Highly-Configurable Two-Level Cache Hierarchy This work was supported by the U.S. National Science Foundation.
Evaluating FERMI features for Data Mining Applications Masters Thesis Presentation Sinduja Muralidharan Advised by: Dr. Gagan Agrawal.
A Decompression Architecture for Low Power Embedded Systems Lekatsas, H.; Henkel, J.; Wolf, W.; Computer Design, Proceedings International.
On Tuning Microarchitecture for Programs Daniel Crowell, Wenbin Fang, and Evan Samanas.
Garo Bournoutian and Alex Orailoglu Proceedings of the 45th ACM/IEEE Design Automation Conference (DAC’08) June /10/28.
Investigating Adaptive Compilation using the MIPSpro Compiler Keith D. Cooper Todd Waterman Department of Computer Science Rice University Houston, TX.
Power Estimation and Optimization for SoC Design
Advanced Computer Architecture Lab University of Michigan Compiler Controlled Value Prediction with Branch Predictor Based Confidence Eric Larson Compiler.
Energy Efficient D-TLB and Data Cache Using Semantic-Aware Multilateral Partitioning School of Electrical and Computer Engineering Georgia Institute of.
Authors – Jeahyuk huh, Doug Burger, and Stephen W.Keckler Presenter – Sushma Myneni Exploring the Design Space of Future CMPs.
CPE 631 Project Presentation Hussein Alzoubi and Rami Alnamneh Reconfiguration of architectural parameters to maximize performance and using software techniques.
Kyushu University Las Vegas, June 2007 The Effect of Nanometer-Scale Technologies on the Cache Size Selection for Low Energy Embedded Systems.
Improving Energy Efficiency of Configurable Caches via Temperature-Aware Configuration Selection Hamid Noori †, Maziar Goudarzi ‡, Koji Inoue ‡, and Kazuaki.
Copyright © 2010 Houman Homayoun Houman Homayoun National Science Foundation Computing Innovation Fellow Department of Computer Science University of California.
Hybrid Multi-Core Architecture for Boosting Single-Threaded Performance Presented by: Peyman Nov 2007.
Power Analysis of Embedded Software : A Fast Step Towards Software Power Minimization 指導教授 : 陳少傑 教授 組員 : R 張馨怡 R 林秀萍.
Addressing Instruction Fetch Bottlenecks by Using an Instruction Register File Stephen Hines, Gary Tyson, and David Whalley Computer Science Dept. Florida.
Lx: A Technology Platform for Customizable VLIW Embedded Processing.
Superscalar Architecture Design Framework for DSP Operations Rehan Ahmed.
On the Importance of Optimizing the Configuration of Stream Prefetches Ilya Ganusov Martin Burtscher Computer Systems Laboratory Cornell University.
Learning A Better Compiler Predicting Unroll Factors using Supervised Classification And Integrating CPU and L2 Cache Voltage Scaling using Machine Learning.
1 of 14 Lab 2: Design-Space Exploration with MPARM.
Quantifying Acceleration: Power/Performance Trade-Offs of Application Kernels in Hardware WU DI NOV. 3, 2015.
1 Aphirak Jansang Thiranun Dumrongson
LOW POWER DESIGN METHODS
Name/Title of Your App Prepared by: …… For the 5 th National ICT Innovation Competition.
??? ple r B Amulya Sai EDM14b005 What is simple scalar?? Simple scalar is an open source computer architecture simulator developed by Todd.
Microcontroller Enhancement Design Project
Andrea Acquaviva, Luca Benini, Bruno Riccò
Evaluating Register File Size
Energy Based Analysis of Cache Design
The Instruction Set Architecture Level
Detailed Analysis of MiBench benchmark suite
Ann Gordon-Ross and Frank Vahid*
A High Performance SoC: PkunityTM
Hyesoon Kim Onur Mutlu Jared Stark* Yale N. Patt
Final Project presentation
Automatic Tuning of Two-Level Caches to Embedded Applications
rePLay: A Hardware Framework for Dynamic Optimization
Presentation transcript:

Power Analysis of WEP Encryption Jack Kang Benjamin Lee CS252 Final Project Fall 2003

Outline Background and Motivation Objective Theory Experimental Methodology Experimental Results Conclusions Future Work & Directions Questions

Background and Motivation (1/4) The Digital Divide Gap between the digitally empowered and digitally poor, between developing and developed nations Can information and communication technologies (ICT) close the gap? There are social AND economic reasons to solve this problem

Background and Motivation (2/4) Problems More talk than action Financial sustainability Coordination of activities Scope E-governance

Bottom of The Pyramid (BOP)  Prahad argues that it is profitable to serve the poor  Multinational Corporations have financial incentive to step in Background and Motivation (3/4) Prahalad, C.K. and Hammon, Allen, Serving the World's Poor, Profitably, Harvard Business Review, 9/2002.

Background and Motivation (4/4) So what about the technical problems? Low-cost Low-power Intermittent Connectivity User Interfaces for populations with multiple languages and low levels of literacy Shared accesses as a possibly dominant use mode Limited skilled workforce for maintenance

Objective Evaluate high-level software optimizations and low-level hardware configurations for reducing power dissipation applied to WEP encryption Provide a framework for further study in wireless communication infrastructure for developing regions

Theory – Loop Unrolling A compiler technique that extends the size of loop bodies by replicating the body n times The loop exit condition is then adjusted accordingly Why is power saved? More efficient front end – less branches means the fetch unit is able to fetch large blocks without being interrupted by control decisions Less branches in the code means reduced power dissipation of the branch prediction hardware

Theory – Cache Optimizations Choices in associativity and block sizes will affect the miss rate of the cache. Power can be saved if we can reduce the miss rate. No need to go off chip Better performance means we may be able to lower the clock frequency (and thus voltage levels) and still meet minimum performance needs

Experimental Methodology Software WEP encryption Software is cheaper (low-cost) Easier to upgrade (limited maintenance) SimpleScalar Simulates hardware and software configurations Wattch Provides power estimation

Wired Equivalent Privacy (1/3) Overview wireless standard Provides wireless network with security equivalent to wired network  Confidentiality  Access Control  Data Integrity

Wired Equivalent Privacy (2/3) Encryption Hirani, Sohail A. Energy Consumption of Encryption Schemes in Wireless Devices. Master’s Thesis. University of Pittsburgh, April 2003.

Wired Equivalent Privacy (3/3) Decryption Hirani, Sohail A. Energy Consumption of Encryption Schemes in Wireless Devices. Master’s Thesis. University of Pittsburgh, April 2003.

SimpleScalar (1/2) Baseline Simulation - Microprocessor In-order issue No branch prediction Minimal number of functional units  Integer ALU  Floating Point ALU  Integer Multiplier/Divider  Floating Point Multiplier/Divider

SimpleScalar (2/2) Baseline Simulation – Memory L1 Instruction Cache  16-KB cache  32-byte blocks  Full associativity L1 Data Cache  16-KB cache  32-byte blocks  4-way associativity Unified L2 Cache  18-KB cache  32-byte blocks  4-way associativity

Wattch (1/2) Overview Framework for analyzing and optimizing microprocessor power dissipation at the architectural level Wattch v1.02 SimpleScalar Interface Simulated PISA instruction set Built on Pentium 4/x86 platform

Wattch (2/2) Conditional Clocking Styles NCC – No conditional clocking CC1 – Simple conditional clocking  Zero power dissipation with zero accesses CC2 – Aggressive conditional clocking (ideal)  Linear power dissipation with fractional accesses CC3 – Aggressive conditional clocking (non-ideal)  15% power dissipation with zero accesses

Experimental Results (1/3)

Cache Associativity (2/3)

Cache Associativity (3/3)

Conclusions Significant power savings from software and hardware optimizations Loop Unrolling  Max = 17% reduction  Median = 15.9% reduction  Mean = 15.9% reduction Cache Associativity  Max = 12.5% reduction  Median = 4% reduction  Mean = 5% reduction

Future Work & Directions Study combined effects of optimizations Apply these optimizations for new microprocessor configurations Apply these optimizations to a larger test suite

References David Brooks, Vivek Tiwari, and Margaret Martonosi, Wattch: A Framework for Architectural-Level Power Analysis and Optimizations, 27 th International Symposium on Computer Architecture (ISCA), June Doug Burger and Todd M. Austin, The SimpleScalar Tool set, Version 2.0, Computer Architecture News, pages 13-25, June Sohail Hirani, Energy Consumption of Encryption Schemes in Wireless Devices, Master’s Dissertation, University of Pittsburgh, Kenneth Keniston, Grassroots ICT projects in India: Some Preliminary Hypotheses, ASCI Journal of Management 31(1&2), C.K. Prahalad and Allen Hammon, Serving the World's Poor, Profitably, Harvard Business Review, September C.K. Prahalad and Stuart L. Hart, The Fortune at the Bottom of the Pyramid, strategy+business, issue 26, SimpleScalar toolset. Wattch toolset.

Questions Any Questions?