Pipelining and Vector Processing
Pipelining and Vector Processing
Pipelining and Vector Processing
Parallel Processing
Pipelining
Arithmetic Pipeline
Instruction Pipeline
RISC Pipeline
Vector Processing
Array Processors(refer book)
Parallel Processing
PARALLEL PROCESSING
Parallel Processing
PARALLEL COMPUTERS
Architectural Classification
Flynn's classification
Based on the multiplicity of Instruction Streams and
Data Streams
Instruction Stream
Sequence of Instructions read from memory
Data Stream
Operations performed on the data in the processor
Number of Single
Instruction
Streams
Multiple
Single
Multiple
SISD
SIMD
MISD
MIMD
Parallel Processing
SISD
Superscalar processors
Superpipelined processors
VLIW
MISD
Nonexistence
SIMD
Array processors
Systolic arrays
Dataflow
Associative processors
MIMD
Reduction
Shared-memory multiprocessors
Bus based
Crossbar switch based
Multistage IN based
Message-passing multicomputers
Hypercube
Mesh
Reconfigurable
Parallel Processing
Processor
Unit
Data stream
Memory
Instruction stream
Characteristics
- Standard von Neumann machine
- Instructions and data are stored in memory
- One operation at a time
Limitations
Von Neumann bottleneck
Maximum speed of the system is limited by the
Memory Bandwidth (bits/sec or bytes/sec)
- Limitation on Memory Bandwidth
- Memory is shared by CPU and I/O
Parallel Processing
CU
CU
CU
Memory
Data stream
Instruction stream
Characteristics
- There is no computer at present that can be
classified as MISD
Parallel Processing
Processor units
Data stream
Alignment network
Characteristics
- Only one copy of the program exists
- A single controller executes one instruction at a time
Memory modules
Parallel Processing
Interconnection Network
Shared Memory
Characteristics
- Multiple processing units
- Execution of multiple instructions on multiple data
Pipelining
PIPELINING
A technique of decomposing a sequential process
into suboperations, with each subprocess being
executed in a partial dedicated segment that
operates concurrently with all other segments.
Ai * Bi + Ci
Segment 1
for i = 1, 2, 3, ... , 7
Ai
Bi
R1
R2
Memory Ci
Multiplier
Segment 2
R4
R3
Segment 3
Adder
R5
R1 Ai, R2 Bi
R3 R1 * R2, R4 Ci
R5 R3 + R4
Load Ai and Bi
Multiply and load Ci
Add
Pipelining
Segment 2
R3
A1 * B1
A2 * B2
A3 * B3
A4 * B4
A5 * B5
A6 * B6
A7 * B7
R4
C1
C2
C3
C4
C5
C6
C7
Segment 3
R5
A1 * B1 + C1
A2 * B2 + C2
A3 * B3 + C3
A4 * B4 + C4
A5 * B5 + C5
A6 * B6 + C6
A7 * B7 + C7
Pipelining
GENERAL PIPELINE
General Structure of a 4-Segment Pipeline
Clock
Input
S1
R1
S2
R2
S3
R3
S4
R4
Space-Time Diagram
Segment 1
2
3
4
T1
T2
T3
T4
T5
T6
T1
T2
T3
T4
T5
T6
T1
T2
T3
T4
T5
T6
T1
T2
T3
T4
T5
T6
Clock cycles
Pipelining
PIPELINE SPEEDUP
n: Number of tasks to be performed
Conventional Machine (Non-Pipelined)
tn: Clock cycle
: Time required to complete the n tasks
= n * tn
Pipelined Machine (k stages)
tp: Clock cycle (time to complete each suboperation)
: Time required to complete the n tasks
= [k + (n - 1)] * tp
Speedup
Sk: Speedup
Sk = n*tn / (k + n - 1)*tp
tn
lim Sk =
( = k, if tn = k * tp )
tp
n
Pipelining
Ii
I i+1
I i+2
I i+3
P1
P2
P3
P4
Arithmetic Pipeline
ARITHMETIC PIPELINE
Floating-point adder
X = A x 2a
Y = B x 2b
[1]
[2]
[3]
[4]
Segment 1:
Exponents
a
b
Mantissas
A
B
Compare
exponents
by subtraction
Difference
Segment 2:
Choose exponent
Align mantissa
R
Add or subtract
mantissas
Segment 3:
Segment 4:
Adjust
exponent
R
R
Normalize
result
R
Instruction Pipeline
INSTRUCTION CYCLE
Six Phases* in an Instruction Cycle
[1] Fetch an instruction from memory
[2] Decode the instruction
[3] Calculate the effective address of the operand
[4] Fetch the operands from memory
[5] Execute the operation
[6] Store the result in the proper place
* Some instructions skip some phases
* Effective address calculation can be done in
the part of the decoding phase
* Storage of the operation result into a register
is done automatically in the execution phase
==> 4-Stage Pipeline
[1] FI: Fetch an instruction from memory
[2] DA: Decode the instruction and calculate
the effective address of the operand
[3] FO: Fetch the operand
[4] EX: Execute the operation
Instruction Pipeline
INSTRUCTION PIPELINE
FI
DA
FO EX
i+1
FI
DA FO
EX
i+2
Pipelined
i
FI
DA FO
i+1
FI
DA FO
i+2
FI
EX
EX
DA FO EX
FI
DA
FO EX
Instruction Pipeline
Fetch instruction
from memory
Segment2:
Decode instruction
and calculate
effective address
yes
Segment3:
Segment4:
Interrupt
handling
Branch?
no
Fetch operand
from memory
Execute instruction
yes
Interrupt?
no
Update PC
Empty pipe
Step:
Instruction
1
2
(Branch)
3
4
5
6
7
FI
DA
FO
EX
FI
DA
FO
EX
FI
DA
FO
FI
10
11
12
FI
DA
FO
EX
FI
DA
FO
EX
FI
DA
FO
FI
DA FO
13
EX
EX
EX
Instruction Pipeline
R1 <- B + C
R1 <- R1 + 1
ADD
Data dependency
DA
B,C
INC
DA
bubble
R1
+1
Control hazards
Branches and other instructions that change the PC
make the fetch of the next instruction to be delayed
JMP
ID
PC
bubble
PC
ID
OF
OE
OS
Pipeline Interlock:
Detect Hazards Stall until it is cleared
Instruction Pipeline
DATA HAZARDS
Data Hazards
Occurs when the execution of an instruction
depends on the results of a previous instruction
ADD
R1, R2, R3
SUB
R4, R1, R5
Data hazard can be dealt with either hardware
techniques or software technique
Hardware Technique
Interlock
- hardware detects the data dependencies and delays the scheduling
of the dependent instruction by stalling enough clock cycles
Forwarding (bypassing, short-circuiting)
- Accomplished by a data path that routes a value from a source
(usually an ALU) to a user, bypassing a designated register. This
allows the value to be produced to be used at an earlier stage in the
pipeline than would otherwise be possible
Software Technique
The compiler is designed to detect a data conflict and reorder instructions
As necessary to delay the loading of the conflicting data by inserting no-operation
instructions.This method is called DELAY LOAD
Instruction Pipeline
FI
DA
FO
EX
FI
DA
FO
EX
Instruction Pipeline
CONTROL HAZARDS
Prefetch Target Instruction
Pre-Fetch the target instructions in addition to the instruction following the branch.
Both are saved until branch is executed. Then, select the right instruction stream and discard the
wrong stream.
- If the branch condition is successful then, the pipeline continues from the branch target
instruction.
Branch Target Buffer(BTB; Associative Memory)
Present in the fetch segment of the pipeline. It has entry of the Address of previously executed
branches i.e. their Target instruction and the next few instructions
When fetching an instruction, search BTB.
If found, fetch the instruction stream in BTB;
If not, new stream is fetched and update BTB
Loop Buffer (High Speed Register file)
A variation of BTB. A register file maintained by the instruction fetch segment of the pipeline.
Register file stores the entire loop that allows to execute a loop without accessing memory
Branch Prediction
Uses additional logic to guess the outcome of the branch condition before it is executed.
The instruction is fetched based on the guess. Correct guess eliminates the branch penalty.
Delayed Branch
Compiler detects the branch and rearranges the instruction sequence by inserting useful
instructions that keep the pipeline busy in the presence of a branch instruction.
RISC Pipeline
RISC PIPELINE
RISC
- Machine with a very fast clock cycle that executes at the rate of
one instruction per cycle
<- Simple Instruction Set
Fixed Length Instruction Format
Register-to-Register Operations
Instruction Cycles of Three-Stage Instruction Pipeline
Data Manipulation Instructions
I:
Instruction Fetch
A: Decode, Read Registers, ALU Operations
E: Write a Register
Load and Store Instructions
I:
Instruction Fetch
A: Decode, Evaluate Effective Address
E: Register-to-Memory or Memory-to-Register
Program Control Instructions
I:
Instruction Fetch
A: Decode, Evaluate Branch Address
E: Write Register(PC)
RISC Pipeline
1 2 3 4 5 6
I A E
I A E
I A E
I A E
1 2 3 4 5 6 7
I A E
I A E
I A E
I A E
I A E
RISC Pipeline
DELAYED BRANCH
Compiler analyzes the instructions before and after
the branch and rearranges the program sequence by
inserting useful instructions in the delay steps
Using no-operation instructions
Clock cycles:
1. Load
2. Increment
3. Add
4. Subtract
5. Branch to X
6. NOP
7. NOP
8. Instr. in X
1 2 3 4 5 6 7 8 9 10
I A E
I A E
I A E
I A E
I A E
I A E
I A E
I A E
1 2 3 4 5 6 7 8
I A E
I A E
I A E
I A E
I A E
I A E
Vector Processing
VECTOR PROCESSING
Vector Processing Applications
Problems that can be efficiently formulated in terms of vectors
Vector Processing
VECTOR PROGRAMMING
20
DO 20 I = 1, 100
C(I) = B(I) + A(I)
Conventional computer
Initialize I = 0
20 Read A(I)
Read B(I)
Store C(I) = A(I) + B(I)
Increment I = i + 1
If I 100 goto 20
Vector computer
C(1:100) = A(1:100) + B(1:100)
Vector Processing
Base address
source 1
Base address
source 2
Base address
destination
Vector
length
Multiplier
pipeline
Adder
pipeline
The values of A and B are either in memory or in processor registers. Each floating
point adder and multiplier unit is supposed to have 4 segments. All segment
registers are initially initialized to zero. Therefore the output of the adder is zero
for the first 8 cycles until both the pipes are full.
Ai and Bi are brought in and multiplied at a rate of one pair per cycle. After 4 cycles
the products are added to the Output of the adder. During the next 4 cycles zero is added.
At the end of the 8th cycle the first four products A1B1 through A4B4 are in the four
adder segments and the next four products A5 B5 through A8B8 are in the multiplier
Segments.
Thus the 9th cycle and onwards starts breaking down the summation into four sections: