02 - the changing face of computer architecture.ppt

Upload: suganya-periasamy

Post on 04-Jun-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    1/24

    1

    CSCI 6380

    The Changing Face ofComputer Architecture

    Spring, 2008Doug L Hof fman, PhD

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    2/24

    Page 2

    CSCI 6380Advanced Computer Architecture

    Overview

    Computer Science at a Crossroads

    Computer Architecture v. Instruction

    Set Arch.

    What Computer Architecture brings

    to table

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    3/24

    3

    Computer Science at aCrossroads

    CSCI 6380Advanced Computer Architecture

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    4/24

    Page 4

    CSCI 6380Advanced Computer Architecture

    Instruction Set Architecture: Critical Interface

    instruction set

    software

    hardware

    Properties of a good abstraction Lasts through many generations (portability) Used in many different ways (generality) Provides convenient functionality to higher levels Permits an efficientimplementation at lower levels

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    5/24

    Page 5

    CSCI 6380Advanced Computer Architecture

    Example: MIPS RISC Architecture0r0

    r1r31

    PC

    lohi

    Programmable storage2^32 x bytes

    31 x 32-bit GPRs (R0=0)

    32 x 32-bit FP regs (paired DP)

    HI, LO, PC

    Data types ?Format ?

    Addressing Modes?

    Arithmetic logical

    Add, AddU, Sub, SubU, And, Or, Xor, Nor, SLT, SLTU,

    AddI, AddIU, SLTI, SLTIU, AndI, OrI, XorI, LUI

    SLL, SRL, SRA, SLLV, SRLV, SRAV

    Memory Access

    LB, LBU, LH, LHU, LW, LWL,LWR

    SB, SH, SW, SWL, SWR

    Control

    J, JAL, JR, JALR

    BEq, BNE, BLEZ,BGTZ,BLTZ,BGEZ,BLTZAL,BGEZAL

    32-bit instructions on word boundary

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    6/24

    Page 6

    CSCI 6380Advanced Computer Architecture

    Instruction Set Architecture

    ... the attributes of a [computing] system as seen by theprogrammer, i.e. the conceptual structure and functionalbehavior, as distinct from the organization of the dataflows and controls the logic design, and the physicalimplementation. Amdahl,

    Blaauw, and Brooks, 1964 SOFTWARE-- Organization of Programmable

    Storage

    -- Data Types & Data Structures:Encodings & Representations

    -- Instruction Formats

    -- Instruction (or Operation Code) Set

    -- Modes of Addressing and Accessing Data Items and Instructions

    -- Exceptional Conditions

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    7/24

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    8/248

    ISA vs. Computer Architecture

    CSCI 6380Advanced Computer Architecture

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    9/24Page 9

    CSCI 6380Advanced Computer Architecture

    ISA vs. Computer Architecture

    Old definition of computer architecture= instruction set design Other aspects of computer design called implementation

    Insinuates implementation is uninteresting or less challenging

    Our view is computer architecture >> ISA Architects job much more than instruction set design;

    technical hurdles today morechallenging than those ininstruction set design

    Since instruction set design not where action is, some

    conclude computer architecture (using old definition) isnot where action is We disagree on conclusion

    Agree that ISA not where action is (ISA in CA:AQA 4/e appendix)

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    10/24Page 10

    CSCI 6380Advanced Computer Architecture

    Computer Architecture is an Integrated Approach

    What really matters is the functioning of thecomplete system hardware, runtime system, compiler, operating system,

    and application In networking, this is called the End to End argument

    Computer architecture is not just about transistors,individual instructions, or particularimplementations E.g., Original RISC projects replaced complex

    instructions with a compiler + simple instructions

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    11/24Page 11

    CSCI 6380Advanced Computer Architecture

    Computer Architecture is Design and Analysis

    Design

    Analysis

    Architecture is an iterative process:Searching the space of possible designsAt all levels of computer systems

    Creativity

    Good Ideas

    Mediocre Ideas

    Bad Ideas

    Cost /PerformanceAnalysis

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    12/2412

    What Computer ArchitectureBrings to the Table

    CSCI 6380Advanced Computer Architecture

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    13/24Page 13

    CSCI 6380Advanced Computer Architecture

    What Computer Architecture brings to Table

    Other fields often borrow ideas from architecture Quantitative Principles of Design

    1. Take Advantage of Parallelism2. Principle of Locality3. Focus on the Common Case

    4. Amdahls Law5. The Processor Performance Equation

    Careful, quantitative comparisons Define, quantity, and summarize relative performance Define and quantity relative cost

    Define and quantity dependability Define and quantity power

    Culture of anticipating and exploiting advances intechnology

    Culture of well-defined interfaces that are carefully

    implemented and thoroughly checked

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    14/24Page 14

    CSCI 6380Advanced Computer Architecture

    1) Taking Advantage of Parallelism

    Increasing throughput of server computer via multipleprocessors or multiple disks

    Detailed HW design Carry lookahead addersuses parallelism to speed up computing

    sums from linear to logarithmic in number of bits per operand

    Multiple memory bankssearched in parallel in set-associativecaches

    Pipelining: overlap instruction execution to reduce thetotal time to complete an instruction sequence. Not every instruction depends on immediate predecessor

    executing instructions completely/partially in parallel possible

    Classic 5-stage pipeline:1) Instruction Fetch (Ifetch),2) Register Read (Reg),3) Execute (ALU),

    4) Data Memory Access (Dmem),5) Register Write (Reg)

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    15/24Page 15

    CSCI 6380Advanced Computer Architecture

    Pipelined Instruction Execution

    In

    str.

    Or

    der

    Time (clock cycles)

    RegALU

    DMemIfetch Reg

    RegALU

    DMemIfetch Reg

    RegALU

    DMemIfetch Reg

    RegALU

    DMemIfetch Reg

    Cycle 1Cycle 2 Cycle 3 Cycle 4 Cycle 6 Cycle 7Cycle 5

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    16/24Page 16

    CSCI 6380Advanced Computer Architecture

    Limits to pipelining

    Hazardsprevent next instruction from executingduring its designated clock cycle Structural hazards: attempt to use the same hardware to do

    two different things at once

    Data hazards: Instruction depends on result of priorinstruction still in the pipeline

    Control hazards: Caused by delay between the fetching ofinstructions and decisions about changes in control flow(branches and jumps).

    Instr.

    Orde

    r

    Time (clock cycles)

    RegALU

    DMemIfetch Reg

    RegALU

    DMemIfetch Reg

    RegALU

    DMemIfetch Reg

    RegALU

    DMemIfetch Reg

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    17/24Page 17

    CSCI 6380Advanced Computer Architecture

    2) The Principle of Locality

    The Principle of Locality: Program access a relatively small portion of the address space at

    any instant of time.

    Two Different Types of Locality: Temporal Locality (Locality in Time): If an item is referenced, it

    will tend to be referenced again soon (e.g., loops, reuse) Spatial Locality (Locality in Space): If an item is referenced, items

    whose addresses are close by tend to be referenced soon(e.g., straight-line code, array access)

    Last 30 years, HW relied on locality for memory perf.

    P MEM$

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    18/24Page 18

    CSCI 6380Advanced Computer Architecture

    Levels of the Memory Hierarchy

    CPU Registers100s Bytes300 500 ps (0.3-0.5 ns)

    L1 and L2 Cache10s-100s K Bytes~1 ns - ~10 ns$1000s/ GByte

    Main MemoryG Bytes80ns- 200ns~ $100/ GByte

    Disk10s T Bytes, 10 ms(10,000,000 ns)~ $1 / GByte

    CapacityAccess TimeCost

    Tapeinfinite

    sec-min~$1 / GByte

    Registers

    L1 Cache

    Memory

    Disk

    Tape

    Instr. Operands

    Blocks

    Pages

    Files

    StagingXfer Unit

    prog./compiler1-8 bytes

    cache cntl32-64 bytes

    OS4K-8K bytes

    user/operatorMbytes

    Upper Level

    Lower Level

    faster

    Larger

    L2 Cachecache cntl64-128 bytesBlocks

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    19/24Page 19

    CSCI 6380Advanced Computer Architecture

    3) Focus on the Common Case

    Common sense guides computer design Since its engineering, common sense is valuable

    In making a design trade-off, favor the frequent caseover the infrequent case E.g., Instruction fetch and decode unit used more frequently

    than multiplier, so optimize it 1st E.g., If database server has 50 disks / processor, storage

    dependability dominates system dependability, so optimize it 1st

    Frequent case is often simpler and can be done fasterthan the infrequent case E.g., overflow is rare when adding 2 numbers, so improve

    performance by optimizing more common case of no overflow May slow down overflow, but overall performance improved by

    optimizing for the normal case

    What is frequent case and how much performanceimproved by making case faster =>Amdahls Law

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    20/24Page 20

    CSCI 6380Advanced Computer Architecture

    4) Amdahls Law

    enhanced

    enhancedenhanced

    new

    old

    overall

    Speedup

    FractionFraction

    1

    ExTime

    ExTime

    Speedup

    1

    Best you could ever hope to do:

    enhancedmaximum Fraction-1

    1Speedup

    enhanced

    enhancedenhancedoldnew Speedup

    FractionFractionExTimeExTime 1

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    21/24Page 21

    CSCI 6380Advanced Computer Architecture

    Amdahls Law example

    New CPU 10X faster I/O bound server, so 60% time waiting for I/O

    56.1

    64.0

    1

    10

    0.40.41

    1

    SpeedupFractionFraction1

    1Speedup

    enhanced

    enhancedenhanced

    overall

    Apparently, its human nature to be attracted by 10Xfaster, vs. keeping in perspective its just 1.6X faster

    P

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    22/24Page 22

    CSCI 6380Advanced Computer Architecture

    5) Processor performance equation

    CPU time = Seconds = Instructions x Cycles x Seconds

    Program Program Instruction Cycle

    Inst Count CPI Clock Rate

    Program X

    Compiler X (X)

    Inst. Set. X X

    Organization X X

    Technology X

    inst count

    CPI

    Cycle time

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    23/24

    Page 23

    CSCI 6380Advanced Computer Architecture

    Whats a Clock Cycle?

    Old days: 10 levels of gates

    Today: determined by numerous time-of-flight issues +gate delays clock propagation, wire lengths, drivers

    Latchor

    register

    combinationallogic

  • 8/13/2019 02 - The Changing Face of Computer Architecture.ppt

    24/24

    CSCI 6380Advanced Computer Architecture

    Next Time

    Technology Trends