• Aucun résultat trouvé

1. Un exemple de micro-architecture Chemin de données

N/A
N/A
Protected

Academic year: 2022

Partager "1. Un exemple de micro-architecture Chemin de données"

Copied!
11
0
0

Texte intégral

(1)

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

1

La couche micro-architecture (Chapter 4)

1. Un exemple de micro-architecture Chemin de données

Micro-instructions

Contrôle de micro-instructions 2. Exemple de couche ISA: l’IJVM 3. Exemple d’implémentation

4. Conception d’une micro-architecture 5. Amélioration des performances

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

2

The Data Path (1)

The data path of the example microarchitecture used in this

chapter.

3

The Data Path (2)

Useful combinations of ALU signals and the function performed.

4

Data Path Timing

Timing diagram of one data path cycle.

(2)

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

5

Memory Operation

Mapping of the bits in MAR to the address bus.

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

6

Microinstructions

The microinstruction format for the Mic-1.

7

Microinstruction Control:

The Mic-1 (1)

The complete block diagram of our example

microarchitecture, the Mic-1.

8

Microinstruction Control: The Mic-1 (2)

A microinstruction with JAMZ set to 1 has two potential

successors.

(3)

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

9

La couche micro-architecture (Chapter 4)

1. Un exemple de Microarchitecture 2. Exemple de couche ISA: l’IJVM

Pile

Modèle de mémoire Jeu d’instructions

Compilation de code Java pour l’IJVM 3. Exemple d’implémentation

4. Conception d’une micro-architecture 5.Amélioration des performances

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

10

Stacks (1)

Use of a stack for storing local variables.

(a) While A is active. (b) After A calls B.

(c) After B calls C. (d) After C and B return and A calls D.

11

Stacks (2)

Use of an operand stack for doing an arithmetic computation.

12

The IJVM Memory Model

The various parts of the IJVM memory.

(4)

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

13

The IJVM Instruction Set (1)

The IJVM instruction set. The operands byte, const, and varnum are 1 byte. The operands disp, index, and offset are 2 bytes.

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

14

The IJVM Instruction Set (2)

(a) Memory before executing INVOKEVIRTUAL.

(b) After executing it.

15

The IJVM Instruction Set (3)

(a) Memory before executing IRETURN.

(b) After executing it. 16

Compiling Java to IJVM (1)

(a) A Java fragment.

(b) The corresponding Java assembly language.

(c) The IJVM program in hexadecimal.

(5)

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

17

Compiling Java to IJVM (1)

The stack after each instruction of Fig. 4-14(b).

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

18

La couche micro-architecture (Chapter 4)

1. Un exemple de micro-architecture 2. Exemple de couche ISA: l’IJVM 3. Exemple d’implémentation

Notation des micro-instructions Implémentation de l’IJVM avec Mic1 4. Conception d’une micro-architecture 5.Amélioration des performances

19

Microinstructions and Notation

•Permitted operations

•May be extended by

•adding ‘‘<< 8’’:

•shift left by 1 byte.

•A common operation:

•H = MBR << 8.

20

Implementation of IJVM Using the Mic-1 (1)

The microprogram for the Mic-1.

(6)

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

21

Implementation of IJVM Using the Mic-1 (2)

The microprogram for the Mic-1.

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

22

Implementation of IJVM Using the Mic-1 (3)

The microprogram for the Mic-1.

23

Implementation of IJVM Using the Mic-1 (4)

The microprogram for the Mic-1. 24

Implementation of IJVM Using the Mic-1 (5)

The microprogram for the Mic-1.

(7)

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

25

Implementation of IJVM Using the Mic-1 (6)

The BIPUSH instruction format.

(a) ILOAD with a 1-byte index.

(b) WIDE ILOAD with a 2-byte index.

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

26

Implementation of IJVM Using the Mic-1 (7)

The initial microinstruction sequence for ILOAD and WIDE ILOAD. The addresses are examples.

27

Implementation of IJVM Using the Mic-1 (8)

The IINC instruction has two different operand fields.

28

Implementation of IJVM Using the Mic-1 (9)

The situation at the start of various microinstructions.

(a) Main1. (b) goto1. (c) goto2. (d) goto3. (e) goto4.

(8)

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

29

Merging the Interpreter Loop with the Microcode (1)

Original microprogram sequence for executing POP.

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

30

Merging the Interpreter Loop with the Microcode (2)

Enhanced microprogram sequence for executing POP.

31

A Three Bus Architecture (1)

Mic-1 code for executing ILOAD.

32

A Three Bus Architecture (2)

Three-bus code for executing ILOAD.

(9)

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

33

A Three Bus Architecture (3)

A fetch unit for the Mic-1.

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

34

A Three Bus Architecture (4)

A finite state machine for implementing the IFU.

35

Out-of-Order Execution and Register Renaming (1)

A superscalar CPU with in-order issue and in-order completion.

36

Out-of-Order Execution and Register Renaming (2)

A superscalar CPU with in-order issue and in-order completion.

(10)

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

37

Out-of-Order Execution and Register Renaming (3)

Operation of a superscalar CPU with out-of-order issue and out of-order completion.

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

38

Speculative Execution

(a) A program fragment.

(b) The corresponding basic block graph.

39

Overview of the NetBurst Microarchitecture

The block diagram of the Pentium 4.

40

The NetBurst Pipeline

A simplified

view of the

Pentium 4

data path.

(11)

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

41

Overview of the UltraSPARC III Cu Microarchitecture

The block diagram of the UltraSPARC III Cu.

Tanenbaum, Structured Computer Organization, Fifth Edition, (c) 2006 Pearson Education, Inc. All rights reserved. 0-13-148521-0

42

UltraSPARC III Cu Pipeline

A simplified representation of the UltraSPARC III Cu pipeline.

43

The Microarchitecture of the 8051 CPU

The microarchitecture

of the 8051.

Références

Documents relatifs

codes itemized belaN is contained in the RSX I/O Operations Reference Manual (in an Appendix). This is the definitive source for function codes and error return

1. The console terminal, printer port, and communications port are generated as time-sharing terminals but may alternatively be used as communications lines. The

1 All message channels are busy. 4 Message was longer than the receiving buffer.. TSX-Plus provides a real-time program support facility that allows multiple

SEGBLK This parameter specifies the number of 512-byte blocks to allocate for the swap file that is used for extended memory PLAS (Program's Logical Address

2915_05_2001_c1 © 2001, Cisco Systems, Inc. All rights reserved. All rights reserved. All rights reserved. interface signaling types, dial-peers, H.323 registrations). Simple dial

N Small-to-medium network administrator If you plan on building and administering networks with 200 or fewer users, you should extend your knowledge by studying the network

• A sh crypto isakmp sa shows the ISAKMP SA to be in MM_NO_STATE, meaning the main mode failed..

This directive causes the simulation program to begin simulated execution of the test program, beginning at the address in the current location counter.. If instruction