SlideShare a Scribd company logo
7
Most read
8
Most read
11
Most read
Presentation
On
RISC Pipeline
SUBMITED BY:-
ARIJIT CHAKRABORTY
BETI1EC16002
ELECTRONIC & COMMUNICATION
II YEAR, IV SEM
SUBMITED TO:-
Ms. KEERTI SHRIVASTAVA
Asst. PROFESSOR
COMPUTER SCIENCE
TABLE OF CONTENTS :-
What is a Pipeline (computing)
What is a RISC
Introduction of RISC Pipeline
Stages of RISC Pipeline
Hazards
Types Of Hazards
What is a Pipeline (computing) :-
A Pipeline is a set of data processing elements connected in series, where the
output of one element is the input of the next one. The elements of a pipeline
are often executed in parallel or in time-sliced fashion; In that case, Some
amount of buffer storage is often inserted between elements.
Pipeline Include :-
Instruction pipelines
Graphics pipelines
Software pipelines
HTTP pipelining
CONTD…
Instruction Pipelines :-
The classic RISC pipeline, which are used in central processing units (CPUs) to allow overlapping
execution of multiple instructions with the same circuitry. The circuitry is usually divided up into
stages and each stage processes one instruction at a time. Examples of stages are instruction decode,
arithmetic/logic and register fetch.
Graphics Pipelines :-
In most graphics processing units (GPUs), which consist of multiple arithmetic units, or
complete CPUs, that implement the various stages of common rendering operations (perspective
projection, window clipping, color and light calculation, rendering, etc.).
Software Pipelines :-
Where commands can be written where the output of one operation is automatically fed to the next,
following operation. The Unix system call pipe is a classic example of this concept, although other
operating systems do support pipes as well.
HTTP Pipelining :-
Where multiple requests are sent without waiting for the result of the first request.
Pipeline categories :-
• Linear Pipelines:-
A linear pipeline processor is a series of processing stages and memory access.
• Non-linear Pipelines:-
A non-linear pipelining (also called dynamic pipeline) can be configured to perform various
functions at different times. In a dynamic pipeline, there is also feed-forward or feed-back
connection. A non-linear pipeline also allows very long instruction words.
CONTD…
What is a RISC:-
A Reduced Instruction Set Computer or RISC , Is one whose Instruction Set
Architecture (ISA) has a set of attributes that allows it to have a lower cycles per
instruction (CPI) than a Complex Instruction Set Computer (CISC).
A computer that has a small set of simple and general instructions, rather than a large
set of complex and specialized instructions.
Another common RISC trait is their load/store architecture, where memory is only
accessed through specific instructions, rather than as a part of most instructions.
Use of RISC Architectures :-
RISC architectures are now used across a wide range of platforms, from cellular
telephones and tablet computers to some of the world's fastest supercomputers such
as the K computer.
RISC Pipeline:-
In the history of computer hardware, some early reduced instruction set
computer central processing units (RISC CPUs) used a very similar architectural
solution, now called a classic RISC pipeline. Those CPUs were: MIPS, SPARC,
Motorola 88000, and later the notional CPU DLX invented for education.
Each of these classic scalar RISC designs fetched and tried to execute one
instruction per cycle. The main common concept of each design was a five-stage
execution instruction pipeline. During operation, each pipeline stage worked on
one instruction at a time. Each of these stages consisted of an initial set of flip-
flops and combinational logic that operated on the outputs of those flip-flops.
Introduction of RISC Pipeline:-
The classic five stage RISC Pipeline:-
Instruction fetch
Instruction decode
Execute
Memory access
Writeback
Instruction Fetch:-
The Instruction Cache on these machines had a latency of one cycle, meaning that if
the instruction was in the cache, it would be ready on the next clock cycle. During
the Instruction Fetch stage, a 32-bit instruction was fetched from the cache.
The Program Counter or PC, is a register that holds the address of the current
instruction. It feeds into the PC predictor, which then sends the Program
Counter (PC) to the Instruction Cache to read the current instruction. At the same
time, the PC predictor predicts the address of the next instruction by incrementing
the PC by 4 (all instructions were 4 bytes long). This prediction was always wrong in
the case of a taken branch, jump or exception. Later machines would use more
complicated and accurate algorithms (branch prediction and branch target prediction)
to guess the next instruction address.
CONTD…
Instruction Decode:-
Once fetched from the instruction cache, the instruction bits were shifted down the pipeline,
so that simple combinational logic in each pipeline stage could produce the control signals
for the data-path directly from the instruction bits. As a result, very little decoding is done in
the stage traditionally called the decode stage. A consequence of this lack of decoding meant
however that more instruction bits had to be used specifying what the instruction should do
(and also, what it should not), and that leaves fewer bits for things like register indices.
If the instruction decoded was a branch or jump, the target address of the branch or jump was
computed in parallel with reading the register file. The branch condition is computed after
the register file is read, and if the branch is taken or if the instruction is a jump, the PC
predictor in the first stage is assigned the branch target, rather than the incremented PC that
has been computed. It should be noted that some architectures made use of the ALU in the
Execute stage, at the cost of slightly decrease instruction throughput.
CONTD…
Execute
The Execute stage is where the actual computation occurs. Typically this stage
consists of an Arithmetic and Logic Unit, and also a bit shifter. It may also include a
multiple cycle multiplier and divider.
The Arithmetic and Logic Unit is responsible for performing Boolean operations
(AND, OR, NOT, NAND, NOR, XOR, XNOR) and also for performing integer addition
and subtraction. Besides the result, the ALU typically provides status bits such as
whether or not the result was 0, or if an overflow occurred.
The bit shifter is responsible for shift and rotations.
CONTD…
Memory Access:-
If data memory needs to be accessed, it is done so in this stage.
During this stage, single cycle latency instructions simply have their results forwarded
to the next stage. This forwarding ensures that both single and two cycle instructions
always write their results in the same stage of the pipeline, so that just one write port
to the register file can be used, and it is always available.
For direct mapped and virtually tagged data caching, the simplest by far of
the numerous data cache organizations, two SRAMs are used, one storing data and the
other storing tags.
CONTD…
Writeback:-
During this stage, both single cycle and two cycle instructions write their results into
the register file.
CONTD…
Hazards:-
Hennessy and Patterson coined the term hazard for situations where
instructions in a pipeline would produce wrong answers.
Types of Hazards:-
Structural Hazards
Data Hazards
Control Hazards
Structural Hazards:-
Structural hazards occur when two instructions might attempt to use the same
resources at the same time. Classic RISC pipelines avoided these hazards by
replicating hardware.
Data Hazards
Data hazards occur when an instruction, scheduled blindly, would attempt to use
data before the data is available in the register file.
Control Hazards
Control hazards are caused by conditional and unconditional branching. The
classic RISC pipeline resolves branches in the decode stage, which means the branch
resolution recurrence is two cycles long.
CONTD…
ANY QUESTIONS ???

More Related Content

What's hot (20)

PPTX
RISC - Reduced Instruction Set Computing
Tushar Swami
 
PPT
Cpu organisation
Er Sangita Vishwakarma
 
PPTX
MODES OF TRANSFER.pptx
22X047SHRISANJAYM
 
PPTX
DMA and DMA controller
nishant upadhyay
 
PPS
Cache memory
Anuj Modi
 
PPTX
instruction cycle ppt
sheetal singh
 
PPT
Instruction cycle
shweta-sharma99
 
PPTX
Memory Organization
Kamal Acharya
 
PPTX
Computer architecture input output organization
Mazin Alwaaly
 
PPTX
Microprogrammed Control Unit
PreethiSureshkumar1
 
PPTX
Micro program example
rajshreemuthiah
 
PPTX
Instruction codes
pradeepa velmurugan
 
PPT
Stored program concept
gaurav jain
 
PPTX
Basic Computer Organization and Design
Aksum Institute of Technology(AIT, @Letsgo)
 
PPTX
Types of Instruction Format
Dhrumil Panchal
 
PPT
Microprogram Control
Anuj Modi
 
PPTX
Instruction Formats
RaaviKapoor
 
PPT
Instruction format
Sanjeev Patel
 
PPT
mano.ppt
prathamgunj
 
PPTX
Timing and control
chauhankapil
 
RISC - Reduced Instruction Set Computing
Tushar Swami
 
Cpu organisation
Er Sangita Vishwakarma
 
MODES OF TRANSFER.pptx
22X047SHRISANJAYM
 
DMA and DMA controller
nishant upadhyay
 
Cache memory
Anuj Modi
 
instruction cycle ppt
sheetal singh
 
Instruction cycle
shweta-sharma99
 
Memory Organization
Kamal Acharya
 
Computer architecture input output organization
Mazin Alwaaly
 
Microprogrammed Control Unit
PreethiSureshkumar1
 
Micro program example
rajshreemuthiah
 
Instruction codes
pradeepa velmurugan
 
Stored program concept
gaurav jain
 
Basic Computer Organization and Design
Aksum Institute of Technology(AIT, @Letsgo)
 
Types of Instruction Format
Dhrumil Panchal
 
Microprogram Control
Anuj Modi
 
Instruction Formats
RaaviKapoor
 
Instruction format
Sanjeev Patel
 
mano.ppt
prathamgunj
 
Timing and control
chauhankapil
 

Similar to Presentation on risc pipeline (20)

PDF
W04505116121
IJERA Editor
 
PPTX
CISC & RISC Architecture
Suvendu Kumar Dash
 
PDF
Module 2 of apj Abdul kablam university hpc.pdf
22br14851
 
PPT
lec04-pipelining-intro&hazards.ppt
AfolabiEmmanuel12
 
PPTX
2024_lecture13_come321.pptx.........................
ghada507476
 
PPTX
Introducing Embedded Systems and the Microcontrollers
Ravikumar Tiwari
 
PPT
Risc revolution
Aanandha Saravanan
 
PPTX
Pipelining of Processors
Gaditek
 
PPT
Unit 3
Sneha Soni
 
PDF
10_Pipeline.pdf
WanizaSiddiqui
 
PPTX
lec5 - The processor.pptx
MahadevaAH
 
PPT
Pipeline hazard
AJAL A J
 
PPTX
Lecture-9 Parallel-processing .pptx
hammadtahsan
 
PPT
Pipelining In computer
Talesun Solar USA Ltd.
 
PPTX
3 Pipelining
fika sweety
 
PPTX
Assembly p1
raja khizar
 
PPT
12 processor structure and function
Sher Shah Merkhel
 
PPTX
Computer Organization.pptx
saimagul310
 
PPTX
Pipeline & Nonpipeline Processor
Smit Shah
 
PPT
Pipelining slides
PrasantaKumarDash2
 
W04505116121
IJERA Editor
 
CISC & RISC Architecture
Suvendu Kumar Dash
 
Module 2 of apj Abdul kablam university hpc.pdf
22br14851
 
lec04-pipelining-intro&hazards.ppt
AfolabiEmmanuel12
 
2024_lecture13_come321.pptx.........................
ghada507476
 
Introducing Embedded Systems and the Microcontrollers
Ravikumar Tiwari
 
Risc revolution
Aanandha Saravanan
 
Pipelining of Processors
Gaditek
 
Unit 3
Sneha Soni
 
10_Pipeline.pdf
WanizaSiddiqui
 
lec5 - The processor.pptx
MahadevaAH
 
Pipeline hazard
AJAL A J
 
Lecture-9 Parallel-processing .pptx
hammadtahsan
 
Pipelining In computer
Talesun Solar USA Ltd.
 
3 Pipelining
fika sweety
 
Assembly p1
raja khizar
 
12 processor structure and function
Sher Shah Merkhel
 
Computer Organization.pptx
saimagul310
 
Pipeline & Nonpipeline Processor
Smit Shah
 
Pipelining slides
PrasantaKumarDash2
 
Ad

Recently uploaded (20)

PPTX
Knowledge Representation : Semantic Networks
Amity University, Patna
 
PPTX
Biosensors, BioDevices, Biomediccal.pptx
AsimovRiyaz
 
PPTX
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
PPT
Testing and final inspection of a solar PV system
MuhammadSanni2
 
PPTX
What is Shot Peening | Shot Peening is a Surface Treatment Process
Vibra Finish
 
PDF
Viol_Alessandro_Presentazione_prelaurea.pdf
dsecqyvhbowrzxshhf
 
PPTX
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
PPTX
MODULE 05 - CLOUD COMPUTING AND SECURITY.pptx
Alvas Institute of Engineering and technology, Moodabidri
 
PDF
MODULE-5 notes [BCG402-CG&V] PART-B.pdf
Alvas Institute of Engineering and technology, Moodabidri
 
PPTX
Water Resources Engineering (CVE 728)--Slide 3.pptx
mohammedado3
 
PPTX
OCS353 DATA SCIENCE FUNDAMENTALS- Unit 1 Introduction to Data Science
A R SIVANESH M.E., (Ph.D)
 
PDF
methodology-driven-mbse-murphy-july-hsv-huntsville6680038572db67488e78ff00003...
henriqueltorres1
 
PDF
Submit Your Papers-International Journal on Cybernetics & Informatics ( IJCI)
IJCI JOURNAL
 
PPTX
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
PDF
mbse_An_Introduction_to_Arcadia_20150115.pdf
henriqueltorres1
 
PDF
Electrical Engineer operation Supervisor
ssaruntatapower143
 
PDF
Halide Perovskites’ Multifunctional Properties: Coordination Engineering, Coo...
TaameBerhe2
 
PDF
WD2(I)-RFQ-GW-1415_ Shifting and Filling of Sand in the Pond at the WD5 Area_...
ShahadathHossain23
 
PDF
Digital water marking system project report
Kamal Acharya
 
PPTX
Worm gear strength and wear calculation as per standard VB Bhandari Databook.
shahveer210504
 
Knowledge Representation : Semantic Networks
Amity University, Patna
 
Biosensors, BioDevices, Biomediccal.pptx
AsimovRiyaz
 
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
Testing and final inspection of a solar PV system
MuhammadSanni2
 
What is Shot Peening | Shot Peening is a Surface Treatment Process
Vibra Finish
 
Viol_Alessandro_Presentazione_prelaurea.pdf
dsecqyvhbowrzxshhf
 
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
MODULE 05 - CLOUD COMPUTING AND SECURITY.pptx
Alvas Institute of Engineering and technology, Moodabidri
 
MODULE-5 notes [BCG402-CG&V] PART-B.pdf
Alvas Institute of Engineering and technology, Moodabidri
 
Water Resources Engineering (CVE 728)--Slide 3.pptx
mohammedado3
 
OCS353 DATA SCIENCE FUNDAMENTALS- Unit 1 Introduction to Data Science
A R SIVANESH M.E., (Ph.D)
 
methodology-driven-mbse-murphy-july-hsv-huntsville6680038572db67488e78ff00003...
henriqueltorres1
 
Submit Your Papers-International Journal on Cybernetics & Informatics ( IJCI)
IJCI JOURNAL
 
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
mbse_An_Introduction_to_Arcadia_20150115.pdf
henriqueltorres1
 
Electrical Engineer operation Supervisor
ssaruntatapower143
 
Halide Perovskites’ Multifunctional Properties: Coordination Engineering, Coo...
TaameBerhe2
 
WD2(I)-RFQ-GW-1415_ Shifting and Filling of Sand in the Pond at the WD5 Area_...
ShahadathHossain23
 
Digital water marking system project report
Kamal Acharya
 
Worm gear strength and wear calculation as per standard VB Bhandari Databook.
shahveer210504
 
Ad

Presentation on risc pipeline

  • 1. Presentation On RISC Pipeline SUBMITED BY:- ARIJIT CHAKRABORTY BETI1EC16002 ELECTRONIC & COMMUNICATION II YEAR, IV SEM SUBMITED TO:- Ms. KEERTI SHRIVASTAVA Asst. PROFESSOR COMPUTER SCIENCE
  • 2. TABLE OF CONTENTS :- What is a Pipeline (computing) What is a RISC Introduction of RISC Pipeline Stages of RISC Pipeline Hazards Types Of Hazards
  • 3. What is a Pipeline (computing) :- A Pipeline is a set of data processing elements connected in series, where the output of one element is the input of the next one. The elements of a pipeline are often executed in parallel or in time-sliced fashion; In that case, Some amount of buffer storage is often inserted between elements. Pipeline Include :- Instruction pipelines Graphics pipelines Software pipelines HTTP pipelining
  • 4. CONTD… Instruction Pipelines :- The classic RISC pipeline, which are used in central processing units (CPUs) to allow overlapping execution of multiple instructions with the same circuitry. The circuitry is usually divided up into stages and each stage processes one instruction at a time. Examples of stages are instruction decode, arithmetic/logic and register fetch. Graphics Pipelines :- In most graphics processing units (GPUs), which consist of multiple arithmetic units, or complete CPUs, that implement the various stages of common rendering operations (perspective projection, window clipping, color and light calculation, rendering, etc.). Software Pipelines :- Where commands can be written where the output of one operation is automatically fed to the next, following operation. The Unix system call pipe is a classic example of this concept, although other operating systems do support pipes as well.
  • 5. HTTP Pipelining :- Where multiple requests are sent without waiting for the result of the first request. Pipeline categories :- • Linear Pipelines:- A linear pipeline processor is a series of processing stages and memory access. • Non-linear Pipelines:- A non-linear pipelining (also called dynamic pipeline) can be configured to perform various functions at different times. In a dynamic pipeline, there is also feed-forward or feed-back connection. A non-linear pipeline also allows very long instruction words. CONTD…
  • 6. What is a RISC:- A Reduced Instruction Set Computer or RISC , Is one whose Instruction Set Architecture (ISA) has a set of attributes that allows it to have a lower cycles per instruction (CPI) than a Complex Instruction Set Computer (CISC). A computer that has a small set of simple and general instructions, rather than a large set of complex and specialized instructions. Another common RISC trait is their load/store architecture, where memory is only accessed through specific instructions, rather than as a part of most instructions. Use of RISC Architectures :- RISC architectures are now used across a wide range of platforms, from cellular telephones and tablet computers to some of the world's fastest supercomputers such as the K computer.
  • 7. RISC Pipeline:- In the history of computer hardware, some early reduced instruction set computer central processing units (RISC CPUs) used a very similar architectural solution, now called a classic RISC pipeline. Those CPUs were: MIPS, SPARC, Motorola 88000, and later the notional CPU DLX invented for education. Each of these classic scalar RISC designs fetched and tried to execute one instruction per cycle. The main common concept of each design was a five-stage execution instruction pipeline. During operation, each pipeline stage worked on one instruction at a time. Each of these stages consisted of an initial set of flip- flops and combinational logic that operated on the outputs of those flip-flops. Introduction of RISC Pipeline:-
  • 8. The classic five stage RISC Pipeline:- Instruction fetch Instruction decode Execute Memory access Writeback
  • 9. Instruction Fetch:- The Instruction Cache on these machines had a latency of one cycle, meaning that if the instruction was in the cache, it would be ready on the next clock cycle. During the Instruction Fetch stage, a 32-bit instruction was fetched from the cache. The Program Counter or PC, is a register that holds the address of the current instruction. It feeds into the PC predictor, which then sends the Program Counter (PC) to the Instruction Cache to read the current instruction. At the same time, the PC predictor predicts the address of the next instruction by incrementing the PC by 4 (all instructions were 4 bytes long). This prediction was always wrong in the case of a taken branch, jump or exception. Later machines would use more complicated and accurate algorithms (branch prediction and branch target prediction) to guess the next instruction address. CONTD…
  • 10. Instruction Decode:- Once fetched from the instruction cache, the instruction bits were shifted down the pipeline, so that simple combinational logic in each pipeline stage could produce the control signals for the data-path directly from the instruction bits. As a result, very little decoding is done in the stage traditionally called the decode stage. A consequence of this lack of decoding meant however that more instruction bits had to be used specifying what the instruction should do (and also, what it should not), and that leaves fewer bits for things like register indices. If the instruction decoded was a branch or jump, the target address of the branch or jump was computed in parallel with reading the register file. The branch condition is computed after the register file is read, and if the branch is taken or if the instruction is a jump, the PC predictor in the first stage is assigned the branch target, rather than the incremented PC that has been computed. It should be noted that some architectures made use of the ALU in the Execute stage, at the cost of slightly decrease instruction throughput. CONTD…
  • 11. Execute The Execute stage is where the actual computation occurs. Typically this stage consists of an Arithmetic and Logic Unit, and also a bit shifter. It may also include a multiple cycle multiplier and divider. The Arithmetic and Logic Unit is responsible for performing Boolean operations (AND, OR, NOT, NAND, NOR, XOR, XNOR) and also for performing integer addition and subtraction. Besides the result, the ALU typically provides status bits such as whether or not the result was 0, or if an overflow occurred. The bit shifter is responsible for shift and rotations. CONTD…
  • 12. Memory Access:- If data memory needs to be accessed, it is done so in this stage. During this stage, single cycle latency instructions simply have their results forwarded to the next stage. This forwarding ensures that both single and two cycle instructions always write their results in the same stage of the pipeline, so that just one write port to the register file can be used, and it is always available. For direct mapped and virtually tagged data caching, the simplest by far of the numerous data cache organizations, two SRAMs are used, one storing data and the other storing tags. CONTD…
  • 13. Writeback:- During this stage, both single cycle and two cycle instructions write their results into the register file. CONTD…
  • 14. Hazards:- Hennessy and Patterson coined the term hazard for situations where instructions in a pipeline would produce wrong answers. Types of Hazards:- Structural Hazards Data Hazards Control Hazards
  • 15. Structural Hazards:- Structural hazards occur when two instructions might attempt to use the same resources at the same time. Classic RISC pipelines avoided these hazards by replicating hardware. Data Hazards Data hazards occur when an instruction, scheduled blindly, would attempt to use data before the data is available in the register file. Control Hazards Control hazards are caused by conditional and unconditional branching. The classic RISC pipeline resolves branches in the decode stage, which means the branch resolution recurrence is two cycles long. CONTD…