Download presentation
Presentation is loading. Please wait.
Published byEaster Merritt Modified over 5 years ago
1
Chapter One Introduction to Pipelined Processors
2
Principle of Designing Pipeline Processors
(Design Problems of Pipeline Processors)
3
Internal Data Forwarding and Register Tagging
4
Internal Forwarding and Register Tagging
Internal Forwarding: It is replacing unnecessary memory accesses by register-to-register transfers. Register Tagging: It is the use of tagged registers for exploiting concurrent activities among multiple ALUs.
5
Internal Forwarding Memory access is slower than register-to-register operations. Performance can be enhanced by eliminating unnecessary memory accesses
6
Internal Forwarding This concept can be explored in 3 directions:
Store – Load Forwarding Load – Load Forwarding Store – Store Forwarding
7
Store – Load Forwarding
8
Load – Load Forwarding
9
Store – Store Forwarding
10
Register Tagging
11
Example : IBM Model 91 : Floating Point Execution Unit
12
Example : IBM Model 91-FPU
The floating point execution unit consists of : Data registers Transfer paths Floating Point Adder Unit Multiply-Divide Unit Reservation stations Common Data Bus
14
Example : IBM Model 91-FPU
There are 3 reservation stations for adder named A1, A2 and A3 and 2 for multipliers named M1 and M2. Each station has the source & sink registers and their tag & control fields The stations hold operands for next execution.
16
Example : IBM Model 91-FPU
3 store data buffers(SDBs) and 4 floating point registers (FLRs) are tagged Busy bits in FLR indicates the dependence of instructions in subsequent execution Common Data Bus(CDB) is to transfer operands
17
Example : IBM Model 91-FPU
There are 11 units to supply information to CDB: 6 FLBs, 3 adders & 2 multiply/divide unit Tags for these stations are : Unit Tag FLB1 0001 ADD1 1010 FLB2 0010 ADD2 1011 FLB3 0011 ADD3 1100 FLB4 0100 M1 1000 FLB5 0101 M2 1001 FLB6 0110
18
Example : IBM Model 91-FPU
Internal forwarding can be achieved with tagging scheme on CDB. Example: Let F refers to FLR and FLBi stands for ith FLB and their contents be (F) and (FLBi) Consider instruction sequence ADD F,FLB1 F (F) + (FLB1) MPY F,FLB2 F (F) x (FLB2)
19
Example : IBM Model 91-FPU
During addition : Busy bit of F is set to 1 Contents of F and FLB1 is sent to adder A1 Tag of F is set to 1010 (tag of adder) F Busy Bit = 1 Tag=1010
20
Floating Point Operand Stack(FLOS)
Control 1 2 3 4 5 6 Storage Bus Instruction Unit Decoder Floating Point Operand Stack(FLOS) Floating Point Buffers (FLB) Busy Bit = 1 Tag=1010 Tags Store data buffers 2 (SDB) Adder Multiplier (Common Data Bus) Tag Sink Source CTRL 1010 F 0001 FLB1 Tag Sink Source CTRL
21
Example : IBM Model 91-FPU
Meantime, the decode of MPY reveals F is busy, then F should set tag of M1 as 1010 (Tag of adder) F should change its tag to 1000 (Tag of Multiplier) Send content of FLB2 to M1 F Busy Bit = 1 Tag=1000
22
Floating Point Operand Stack(FLOS)
Control 1 2 3 4 5 6 Storage Bus Instruction Unit Decoder Floating Point Operand Stack(FLOS) Floating Point Buffers (FLB) Busy Bit = 1 Tag=1000 Tags Store data buffers 2 (SDB) Adder Multiplier (Common Data Bus) Tag Sink Source CTRL 1000 F 0010 FLB2 CTRL Tag Sink Source
23
Example : IBM Model 91-FPU
When addition is done, CDB finds that the result should be sent to M1 Multiplication is done when both operands are available
24
Hazard Detection and Resolution
25
Hazard Detection and Resolution
Hazards are caused by resource usage conflicts among various instructions They are triggered by inter-instruction dependencies Terminologies: Resource Objects: set of working registers, memory locations and special flags
26
Hazard Detection and Resolution
Data Objects: Content of resource objects Each Instruction can be considered as a mapping from a set of data objects to a set of data objects. Domain D(I) : set of resource of objects whose data objects may affect the execution of instruction I.
27
Hazard Detection and Resolution
Range R(I): set of resource objects whose data objects may be modified by the execution of instruction I Instruction reads from its domain and writes in its range
28
Hazard Detection and Resolution
Consider execution of instructions I and J, and J appears immediately after I. There are 3 types of data dependent hazards: RAW (Read After Write) WAW(Write After Write) WAR (Write After Write)
29
RAW (Read After Write) The necessary condition for this hazard is
30
RAW (Read After Write) Example: I1 : LOAD r1,a I2 : ADD r2,r1
I2 cannot be correctly executed until r1 is loaded Thus I2 is RAW dependent on I1
31
WAW(Write After Write)
The necessary condition is
32
WAW(Write After Write)
Example I1 : MUL r1, r2 I2 : ADD r1,r4 Here I1 and I2 writes to same destination and hence they are said to be WAW dependent.
33
WAR(Write After Read) The necessary condition is
34
WAR(Write After Read) Example: I1 : MUL r1,r2 I2 : ADD r2,r3
Here I2 has r2 as destination while I1 uses it as source and hence they are WAR dependent
35
Hazard Detection and Resolution
Hazards can be detected in fetch stage by comparing domain and range. Once detected, there are two methods: Generate a warning signal to prevent hazard Allow incoming instruction through pipe and distribute detection to all pipeline stages.
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.