• Tidak ada hasil yang ditemukan

PDF Lecture 1 Introduction

N/A
N/A
Protected

Academic year: 2024

Membagikan "PDF Lecture 1 Introduction"

Copied!
46
0
0

Teks penuh

(1)

Computer Architecture

Lecture 1

Introduction

(2)

Computer Architecture & Network Lab

2

Why do you want to study Computer Architecture?

 Because….You won’t graduate if you don’t take this course.

 Because….You want to design the next great instruction set.

Instruction set architecture has largely converged, especially in the desktop/server/laptop space.

Dictated by powerful market forces (Intel/ARM).

 Because….You want to become a computer architect and design the next great computer systems.

 Because….The design, analysis, implementation concepts that you will learn are vital to all aspects of computer science and engineering – operating systems, computer networks, compiler, programming

languages

 Because….The course will equip you with an intellectual toolbox for dealing with a host of systems design challenges.

From Prof. Fernando C. Colon Osorio’s lecture notes

(3)

Course Goals

 Understand

 Interfaces

Instruction Set Architecture (“The Hardware/Software Interface”)

 Engineering methodology/ Correctness criteria/ Evaluation methods/ Technology trends involved in the following

design techniques

Pipelining

Cache

Multiprocessor

Cache Coherence

Synchronization

Interconnection Network

(4)

Computer Architecture & Network Lab

4

Interface

Source : http://www.webster.com

(5)

Abstract Data Type (ADT) as an Example of Interface

 Abstract data type : A set of data values (state) and associated operations that are precisely specified independent of any particular implementation

 ADT Example : stack

push

is_empty

C re at e_ s ta c k

pop

··

stack S (top)

(bottom)

(6)

Computer Architecture & Network Lab

6

Abstract Data Type (ADT) as an Example of Interface

 Operations viewed as state transformation

2 1 5

S

(Before) stack

2 1 5

S`

4

(After) stack

Push (s, 4)

(7)

Abstraction

 (Before) (After)

Jeff Kramer, “Is Abstraction the Key to Computing,” Communications of ACM,

April 2007, Vol. 50, No. 4, pp. 37 - 42.

(8)

Computer Architecture & Network Lab

8

Abstraction

 (Before) (After)

(9)

Abstraction

 (Before) (After)

Jinwook Seo, “Information Visualization Design for Map Use on Future Mobile

Devices (Presentation at Samsung Electronics, Dec. 8, 2008)

(10)

Computer Architecture & Network Lab

10

Instruction Set Architecture (ISA)

assembler complier

Operating System library

ISA

S/W

H/W

Application

(11)

Instruction Set Architecture as an ADT

 “ …the attributes of a [computing] system as seen by the

programmer, i.e. the conceptual structure (state) and functional behavior (operations), as distinct from the organization of the data flow and controls, the logical design, and the physical implementation.”

- Amdahl, Blaauw, and Brooks, 1964

Registers + Memory

instruction

instruction ….. instruction

instruction

instruction ….. instruction

in s tr uc ti o n

(12)

Computer Architecture & Network Lab

12

Instruction Set Architecture as an ADT

Before Register and Memory

add r

1

, r

2

, r

3

20 2 1 r

3

12 8 r

2

r

1

r

0

PC

63 23 24 22

0 2 7

0 4 2 1 3

··

20 21

··

(add r

1

, r

2

, r

3

) (lw r

2

, 1(r

0

)) (sw r

3

, 0(r

0

)) (beq r

0

, r

1

, 2)

(j 15)

After Register and Memory Registers

Memory

21 2 20 r

3

12 8 r

2

r

1

r

0

PC

63 24 23 22

0 2 7

0 4 2 1 3

··

20 21

··

(add r

1

, r

2

, r

3

) (lw r

2

, 1(r

0

)) (sw r

3

, 0(r

0

)) (beq r

0

, r

1

, 2)

(j 15)

Registers

Memory Assumptions

 8 bit ISA

 # of registers = 4 + PC (Program Counter)

 Memory size = 64B

(13)

Instruction Set Architecture as an ADT

Before Register and Memory

lw r

2

, 1(r

0

)

After Register and Memory 22 2

20 r

3

7 8 r

2

r

1

r

0

PC

63 24 23 22

0 2 7

0 4 2 1 3

··

20 21

··

(add r

1

, r

2

, r

3

) (lw r

2

, 1(r

0

)) (sw r

3

, 0(r

0

)) (beq r

0

, r

1

, 2)

(j 15)

Registers

Memory

21 2 20 r

3

12 8 r

2

r

1

r

0

PC

63 23 24 22

0 2 7

0 4 2 1 3

··

20 21

··

(add r

1

, r

2

, r

3

) (lw r

2

, 1(r

0

)) (sw r

3

, 0(r

0

)) (beq r

0

, r

1

, 2)

(j 15)

Registers

Memory

Assumptions

 8 bit ISA

 # of registers = 4 + PC (Program Counter)

 Memory size = 64B

(14)

Computer Architecture & Network Lab

14

Instruction Set Architecture as an ADT

Before Register and Memory

sw r

3

, 0(r

0

)

After Register and Memory 23 2

20 r

3

7 8 r

2

r

1

r

0

PC

63 24 23 22

0 8 7

0 4 2 1 3

··

20 21

··

(add r

1

, r

2

, r

3

) (lw r

2

, 1(r

0

)) (sw r

3

, 0(r

0

)) (beq r

0

, r

1

, 2)

(j 15)

Registers

Memory

22 2 20 r

3

7 8 r

2

r

1

r

0

PC

63 23 24 22

0 2 7

0 4 2 1 3

··

20 21

··

(add r

1

, r

2

, r

3

) (lw r

2

, 1(r

0

)) (sw r

3

, 0(r

0

)) (beq r

0

, r

1

, 2)

(j 15)

Registers

Memory

Assumptions

 8 bit ISA

 # of registers = 4 + PC (Program Counter)

 Memory size = 64B

(15)

Instruction Set Architecture as an ADT

Before Register and Memory

beq r

0

, r

1

, 2

After Register and Memory 24 2

20 r

3

7 8 r

2

r

1

r

0

PC

63 24 23 22

0 8 7

0 4 2 1 3

··

20 21

··

(add r

1

, r

2

, r

3

) (lw r

2

, 1(r

0

)) (sw r

3

, 0(r

0

)) (beq r

0

, r

1

, 2)

(j 15)

Registers

Memory

23 2 20 r

3

7 8 r

2

r

1

r

0

PC

63 23 24 22

0 8 7

0 4 2 1 3

··

20 21

··

(add r

1

, r

2

, r

3

) (lw r

2

, 1(r

0

)) (sw r

3

, 0(r

0

)) (beq r

0

, r

1

, 2)

(j 15)

Registers

Memory

Assumptions

 8 bit ISA

 # of registers = 4 + PC (Program Counter)

 Memory size = 64B

(16)

Computer Architecture & Network Lab

16

Instruction Set Architecture as an ADT

Before Register and Memory

j 15

After Register and Memory 15 0

20 r

3

7 8 r

2

r

1

r

0

PC

63 24 23 22

0 8 7

0 4 2 1 3

··

20 21

··

(add r

1

, r

2

, r

3

) (lw r

2

, 1(r

0

)) (sw r

3

, 0(r

0

)) (beq r

0

, r

1

, 2)

(j 15)

Registers

Memory

24 0 20 r

3

7 8 r

2

r

1

r

0

PC

63 23 24 22

0 8 7

0 4 2 1 3

··

20 21

··

(add r

1

, r

2

, r

3

) (lw r

2

, 1(r

0

)) (sw r

3

, 0(r

0

)) (beq r

0

, r

1

, 2)

(j 15)

Registers

Memory

Assumptions

 8 bit ISA

 # of registers = 4 + PC (Program Counter)

 Memory size = 64B

(17)

Design Techniques

 Design Techniques

 Engineering methodology

 Correctness criteria

 Evaluation methods

 Technology trends

(18)

Computer Architecture & Network Lab

18

Design Techniques

Processor

I-cache

Unified cache

D-cache Processor

Memory Hierarchy

Input/Output and Storage

To main memory system

Sequential execution Pipelined execution Out-of-order execution Speculative execution

Cache Design

(19)

Design Techniques

MemoryMain Main

Memory

···

Cache Coherence, Synchronization, Interconnection network

Unified cache processor

I-cache D-cache

···

Unified cache processor I-cache D-cache

Interconnection Network

(20)

Computer Architecture & Network Lab

20

Engineering methodology

 Rule 1 : Identify and optimize the common case

 Rule 2 : Make the rare case correct and reasonably fast

(21)

Correctness criteria

 Examples

 Pipelined execution : pipelined execution of instructions is correct if the results is as if the instructions were executed sequentially

 Cache memory : execution of instructions on a system with cache memory is correct if the results is as if the

instructions were executed on the same system but without cache memory

 We’ll see a lot of as if’s

(22)

Computer Architecture & Network Lab

22

Performance Evaluation Methods

 Performance types

 Time

response time

execution time

 Rate

throughput : MIPS, MFLOPS

bandwidth : Mbps

 Ratio

relative performance

(23)

Technology Trends

IBM System 360/50 DEC VAX 11/780 Apple iMac Pentium4

0.15 MIPS 64 KB

$1M

$6.6M per MIPS

$16M per MB

1 MIPS(peak) 0.5 MIPS(estimated)

1 MB

$200K

$200K to $400 per MIPS

$200K per MB

700 MIPS(peak) 427 MIPS(estimated)

32 MB

$1229(September 1998)

$1.75 to $2.90 per MIPS

$38 per MB

~15000 MIPS(peak)

~6000 MIPS(estimated) 512 MB

< $1000

$0.07 to $0.17 per MIPS

< $2 per MB

1965 1977 1998 2005

(24)

Computer Architecture & Network Lab

24

A “Big” Picture

Randy H. Katz, “Tech Titans Building Boom,” IEEE Spectrum, Vol. 46, No. 2,

Feb. 2009, pp. 36 – 39.

(25)

A “Big” Picture

Randy H. Katz, “Tech Titans Building Boom,” IEEE Spectrum, Vol. 46, No. 2,

Feb. 2009, pp. 36 – 39.

(26)

Computer Architecture & Network Lab

26

Embedded Processors

(27)

Embedded Processors

From “Flash and the Embedded Space” by Grady Lambert

(28)

Computer Architecture & Network Lab

28

Embedded Processing Example

Engine

Impact sensors

Navigation &

entert ainment Cent ral

controller

Brakes Airbags

From Prof. Behrooz Parhami’s lecture notes

(29)

Automotive Electronic System

Information Systems

Telematics Fault Tolerant

Body

Electronics Body Functions Fault Fail Safe Functional

Body Electronics

Driving and Vehicle Dynamic Functions

Mobile Communications Navigation

WallFire

Access to DAB WWW

GateWay

GateWay

Theft warning

Door Module Light Module ConditioningAir

Shift by

Wire Engine

Management ABS

Steer by

Wire Brake

by Wire MOSTMOST

Firewire Firewire

CAN CANLinLin

CANCAN TTCAN TTCAN

FlexRay FlexRay

From “Design of Embedded Systems: Methodologies, Tools and Applications” by Alberto Sangiovanni-Vincentelli

(30)

Computer Architecture & Network Lab

30

Technology Trends

 Five components of a computer system

(31)

Chip Manufacturing Process

Die cost + Testing cost + Packaging cost Chip cost =

Final test yield

(32)

Computer Architecture & Network Lab

32

Processor Performance Trends

(33)

Performance Improvements by Advances on Lithography (VLSI) Technology

0.6 µm 148 mm² 3.1M Tx 1994

0.35 µm 90 mm² 3.1M Tx 1996

0.35 µm 195 mm² 5.5M Tx 0.6 µm 1997

306 mm²

5.5M Tx

1995

(34)

Computer Architecture & Network Lab

34

Processor Computations/Energy Trends

J. G. Koomey, et al. “Outperforming Moore’s Law ” IEEE Spectrum, Vol. 47, No. 3, Mar. 2010, pp. 68 – 68.

(35)

Processor Clock Rate/Power Trends

Frequency Voltage

load Capacitive

Power = × 2 ×

(36)

Computer Architecture & Network Lab

36

DRAM Technology Trends

year size cycle time 1980 64 Kbits 250 ns 1983 256 Kbits 220 ns 1986 1 Mbits 190 ns 1989 4 Mbits 165 ns 1992 16 Mbits 145 ns 1996 64 Mbits 125 ns 2000 256 Mbits 100 ns

(4x in three years) 60% increase/year

(4x in four years)

(37)

Transistors Per Die Trends

Source: www.icknowledge.com

(38)

Computer Architecture & Network Lab

38

Lithography Technology Trends

Source: www.icknowledge.com

(39)

Die Size Trends

Source: www.icknowledge.com

(40)

Computer Architecture & Network Lab

40

Defect Density Trends

Source: www.icknowledge.com

(41)

Die Cost and Yield

20 Defects 20 Bad Die 264 Gross Die

92% Yield

20 Defects 16 Bad Die 54 Gross Die

70% Yield

 Die Cost ∝ f (Die size ) 4

Source: www.icknowledge.com

(42)

Computer Architecture & Network Lab

42

Hard-Disk Technology Trends

Source: IBM HDD Evolution by Ed Grochowski at Almaden

Disk density: 1.50x - 1.60x per year (4x in three years)

(43)

Hard-Disk Technology Trends

“Will Hard drives Finally Stop Shrinking?” by Linda Dailey Paulson (IEEE Computer, May 2005)

(44)

Computer Architecture & Network Lab

44

Future Outlook of Flash Memory

Source: Scott Deutsch (SanDisk), “Bringing Solid State Drives to Mainstream Notebooks,” Flash Memory Summit 2007.

(45)

Internet Technology Trends

Source: Lawrence G. Roberts, Beyond Moore's Law: Internet Growth Trends, IEEE COMPUTER JANUARY 2000, pp. 117-119

in DWDM (Dense wavelength Division Multiplexing)

2X/21 months 2X/9 months 2X/6 months

(46)

Computer Architecture & Network Lab

46

Pitfalls of Computer Technology Forecasting

 DOS addresses only 1 MB of RAM because we cannot imagine any applications needing more.” Microsoft, 1980

 “640K ought to be enough for anybody.” Bill Gates, 1981

 “Computers in the future may weigh no more than 1.5 tons.” Popular Mechanics

 “I think there is a world market for maybe five computers.”

Thomas Watson, IBM Chairman, 1943

 “There is no reason anyone would want a computer in their home.” Ken Olsen, DEC founder, 1977

 “The 32-bit machine would be an overkill for a personal computer.” Sol Libes, ByteLines

From Prof. Behrooz Parhami’s lecture notes

Referensi

Dokumen terkait

Penyimpanan Utama: RAM, DRAM, SRAM, ROM, Cache Memory Penyimpanan Kedua: Floppy Disk, Magnetic Storage.. Karakteristik

This project is based on a small computer from Japan called OpenBlockS, which has a PowerPC processor, flash memory, serial port, and two Ethernet interfaces.. For storage it

Architecture Details 1/3 Disk Storage: Meta-data – schema - table definition, view definitions, mappings Data – relation instances, index structures statistics about data Log –

• Microarchitectural techniques • Multiple functional units, superscalar architecture, VLIW, more cache structures e.g., L4 caches, deeper pipelines • Complex systems are more

Secondary storage devices form the auxiliary memory of a computer, which consists of magnetic tape, magnetic disk or hard disk, floppy disk, optical disk CD ROM DVD ROMs, Digital Video

Main Characteristics of the Database Approach continued  Data Abstraction  A data model is used to hide storage details and present the users with a conceptual view of the

ACTING HUMANLY: THE TURING TEST APPROACH • Turing Test: A computer passes the test if a human interrogator, after posing some written questions, cannot tell whether the written

Parallel and distributed computing occurs across many different topic areas in computer science, including algorithms, computer architecture, networks, operating systems, and software