|
Textbook on Computer Architecture
Behrooz Parhami: 2007/06/19 || E-mail: parhami@ece.ucsb.edu || Problems: webadmin@ece.ucsb.edu Other contact info at: Bottom of this page || Go up to: B. Parhami's teaching and textbooks or his home page
On June 19, 2007, Professor Parhami's UCSB ECE website moved to a new location. For an up-to-date version of this page, visit it at the new address: http://www.ece.ucsb.edu/~parhami/text_comp_arch.htm
Parhami, Behrooz, Computer Architecture: From Microprocessors to Supercomputers, Oxford University Press, 556 + xx pp., February 2005 (ISBN 0-19-515455-X). The book is available through Oxford University Press: http://www.oup.com worldwide, http://www.oup.com/us/highered in the USA OUP's catalog page for the book is located: at http://www.oup.com/us/parhami
Return to:
Top of this page Preface “ . . . there is a tendency when you really begin to learn something about a thing not to want to write about it but rather to keep on learning about it . . . unless you are very egotistical, which, of course, accounts for many books.” Ernest Hemingway, Death in the Afternoon The context of computer architecture Computer architecture is an area of study dealing with digital computers at the interface between hardware and software. It is more hardware-oriented than “computer systems,” an area typically covered in courses by the same name in computer science or engineering, and more concerned with software than the fields known as “computer design” and “computer organization.” The subject matter, nevertheless, is quite fluid and varies greatly from one textbook or course to another in its orientation and coverage. This explains, in part, why there are so many different textbooks on computer architecture and why yet another textbook on the subject might serve a useful purpose. Computer architecture encompasses a set of core ideas that are applicable to the design or understanding of virtually any computer, from the tiniest embedded microprocessors that control our appliances, cameras, and numerous other devices through personal, server, and mainframe machines to the most powerful supercomputers found only in (and affordable only by) large data centers or major scientific laboratories. It also branches into more advanced subfields, each with its own community of researchers, periodicals, symposia, and, of course, technical jargon. Computer designers must no doubt be familiar with the entire field to be able to use the range of available methods in designing fast, efficient, and robust systems. Less obvious is the fact that even simple computer users can benefit from a firm grasp of the core ideas and from an awareness of the more advanced concepts in computer architecture. A common theme in computer architecture is coping with complexity. Much of this complexity arises from our desire to make everything as fast as possible. Some of the resulting techniques, such as predictive and speculative execution, are at odds with other goals of system design that include low cost, compactness, power economy, short time to market, and testability. It is the constant push and pull of such conflicting requirements that makes computer architecture a thriving and exciting field of study. Adding to the excitement are the opposing forces of innovation and compatibility with existing investments in skills, systems, and applications. Scope
and features This textbook, an outgrowth of lecture notes that the author has developed and refined over many years, covers the core ideas of computer architecture in some depth and provides an overview of many advanced concepts that may be pursued in higher-level courses such as those on supercomputing, parallel processing, and distributed systems. Six key features set this book apart from competing introductory textbooks on computer architecture: a. Division of material into lecture-size chapters: In the author’s approach to teaching, a lecture is a more or less self-contained module with links to past lectures and pointers to what will transpire in future. Each lecture, lasting one to two hours, has a theme or title and proceeds from motivation to details to conclusion. b. A large number of meaningful problems: At least 16 problems have been provided at the end of each of the 28 chapters. These are well-thought-out problems, many of them class-tested, that clarify the chapter material, offer new viewing angles, link the chapter material to topics in other chapters, or introduce more advanced concepts. c. Emphasis on both the underlying theory and actual designs: The ability to cope with complexity requires both a deep understanding of the theoretical underpinnings of computer architecture and examples of designs that help clarify the theory. Such designs also provide building blocks for synthesis and reference points for cost-performance comparisons. d. Linking computer architecture to other subfields of computing: Computer architecture is nourished by, and in turn feeds, other subfields of computer system design. Such links, from the obvious (instruction-set architecture vis-à-vis compiler design) to the subtle (interplay of architecture with reliability and security), are explained throughout the book. e. Broad coverage of important topics: The text covers virtually all the core topics in computer architecture, thus providing a balanced and complete view of the field. Examples of material not found in many other texts include detailed coverage of computer arithmetic (Chapters 9-12) and high-performance computing (Chapters 25-28). f. Unified and consistent notation/terminology: Every effort is made to use consistent notation/terminology throughout the text. For example, r always stands for the number representation radix, k for word width, and c for carry. Similarly, concepts and structures are consistently identified with unique, well-defined names. Summary
of topics The seven parts of this book, each composed of four chapters, have been written with the following goals: Part I sets the stage, provides context, reviews some of the prerequisite topics, and gives a taste of what is to come in the rest of the book. Included are two refresher-type chapters on digital circuits and components, a discussion of computer system types, an overview of digital computer technology, and a detailed perspective on computer system performance. Part II lays out the user’s interface to computer hardware, also known as the instruction-set architecture (ISA). For concreteness, the instruction set of MiniMIPS (a simplified, yet very realistic, machine for which open reference material and simulation tools exist) is described. Included is a chapter on variations in ISA (e.g., RISC vs CISC) and associated cost-performance trade-offs. The next two parts cover the central processing unit (CPU). Part III describes the structure of arithmetic/logic units (ALUs) in some detail. Included are discussions of fixed- and floating-point number representations, design of high-speed adders, shift and logical operations, and hardware multipliers/dividers. Implementation aspects and pitfalls of floating-point arithmetic are also discussed. Part IV is devoted to the data path and control circuits comprising modern CPUs. Beginning with stages of instruction execution, the needed components and control mechanisms are derived. This material is followed by an exposition of control design strategies, use of a pipelined data path for performance enhancement, and various limitations of pipelining due to data and control dependencies. Part V is concerned with the memory system. The technologies in use for primary and secondary memories are described, along with their strengths and limitations. It is shown how the use of cache memories effectively bridges the speed gap between CPU and main memory. Similarly, the use of virtual memory to provide the illusion of a vast main memory is explained. Part VI deals with input/output and interfacing topics. A discussion of I/O device technologies is followed by methods of I/O programming and the roles of buses and links (including standards) in I/O communication and interfacing. Elements of processes and context switching, for exception handling or multithreaded computation, are also covered. Part VII introduces advanced architectures. An overview of performance enhancement strategies, beyond simple pipelining, is presented, and examples of applications requiring higher performance are cited. The book concludes with design strategies and example architectures based on vector or array processing, multiprocessing, and multicomputing. Pointers
on how to use the book For classroom use, the topics in each chapter of this text can be covered in a lecture of duration 1-2 hours. In his own teaching, the author has used the chapters primarily for 1.5-hour lectures, twice a week, in a 10-week quarter, omitting or combining some chapters to fit the material into the 18-20 lectures that are available. But the modular structure of the text lends itself to other lecture formats, self-study, or review of the field by practitioners. In the latter two cases, the readers can view each chapter as a study unit (for one week, say) rather than as a lecture. Ideally, all topics in each chapter should be covered before moving to the next chapter. However, if fewer lecture hours are available, then some of the subsections located at the end of chapters can be omitted or introduced only in terms of motivations and key results. Problems of varying complexities, from straightforward numerical examples or exercises to more demanding studies or miniprojects, have been supplied for each chapter. These problems form an integral part of the book and have not been added as afterthoughts to make the book more attractive for use as a text. A total of 491 problems are included. Assuming that two lectures are given per week, either weekly or biweekly homework can be assigned, with each assignment having the specific coverage of the respective half-part (two chapters) or part (four chapters) as its “title.” An instructor's manual, with problem solutions, is available and can be requested by qualified instructors from Oxford University Press in New York (www.oup.com/us/highered). PowerPoint presentations, covering the seven parts, are available electronically through the author’s Web page for the book at www.oup.com/us/PARHAMI. [From this OUP catalog page, follow the link to the "Companion Website" which will take you to http://www.ece.ucsb.edu/Faculty/Parhami/text_comp_arch.htm ]. The book’s Web page also includes a list of corrections and additional topics. References to seminal papers in computer architecture, key design ideas, and important state-of-the-art research contributions are listed at the end of each chapter. These references provide good starting points for doing in-depth studies or for preparing term papers/projects. A large number of classical papers and important contributions in computer architecture have been reprinted in [Swar76], [Siew82], and [Sohi98]. New ideas in the field appear in papers presented at the annual International Symposium on Computer Architecture [ISCA]. Other technical meetings of interest include Symposium on High-Performance Computer Architecture [HPCA], International Parallel and Distributed Processing Symposium [IPDP], and International Conference on Parallel Processing [ICPP]. Relevant journals include IEEE Transactions on Computers [TrCo], IEEE Transactions on Parallel and Distributed Systems [TrPD], Journal of Parallel and Distributed Computing [JPDC], and Communications of the ACM [CACM]. Overview papers and topics of broad interest appear in IEEE Computer [Comp], IEEE Micro [Micr], and ACM Computing Surveys [CoSu]. Acknowledgments This text, Computer Architecture: From Microprocessors to Supercomputers, is an outgrowth of lecture notes the author has used for the upper-division undergraduate course ECE 154: Introduction to Computer Architecture at the University of California, Santa Barbara, and, in rudimentary forms, at several other institutions prior to 1988. The text has benefited greatly from keen observations, curiosity, and encouragement of my many students in these courses. A sincere thanks to all of them! Thanks are also due to engineering editors at Oxford University Press (Peter Gordon, who started the project, and Danielle Christensen, who guided it to completion) and to Karen Shapiro, who ably managed the production process. Finally, the granting of permission by Dr. James Larus, of Microsoft Research, for the use of his SPIM simulators is gratefully acknowledged. General
references
The list that follows contains references of two types: (1) books that have greatly influenced the current text and (2) general reference sources for in-depth studies or research. Books and other resources that are relevant to specific chapters are listed in the end-of-chapter bibliographies. [Arch] WWW Computer Architecture Page, a Web resource kept by the Computer Science Department, University of Wisconsin, Madison, has a wealth of information on architecture-related organizations, groups, projects, publications, events, and people: http://www.cs.wisc.edu/~arch/www/index.html [CACM] Communications of the ACM, journal published by the Association for Computing Machinery. [Comp] IEEE Computer, technical magazine published by the IEEE Computer Society. [CoSu] Computing Surveys, journal published by the Association for Computing Machinery. [Henn03] Hennessy, J. L., and D. A. Patterson, Computer Architecture: A Quantitative Approach, Morgan Kaufmann, 3rd ed., 2003. [HPCA] Proceedings of the Symposium(s) on High-Performance Computer Architecture, sponsored by IEEE. The 10th HPCA was held on February 14-18, 2004, in Madrid, Spain. [ICPP] Proceedings of the International Conference(s) on Parallel Processing, held annually since 1972. The 33rd ICPP was held on August 15-18, 2004, in Montreal, Canada. [IPDP] Proceedings of the International Parallel and Distributed Processing Symposium(s), formed in 1998 from merging IPPS (held annually beginning in 1987) and SPDP (held annually beginning in 1989). The latest IPDPS was held on April 26-30, 2004, in Santa Fe, New Mexico. [ISCA] Proceedings of the International Symposium(s) on Computer Architecture, held annually since 1973, usually in May or June. The 31st ISCA was held on June 19-23, 2004, in Munich, Germany. [JPDC] Journal of Parallel and Distributed Computing, published by Academic Press. [Micr] IEEE Micro, technical magazine published by the IEEE Computer Society. [Muel00] Mueller, S. M., and W. J. Paul, Computer Architecture: Complexity and Correctness, Springer, 2000. [Patt98] Patterson, D. A., and J. L. Hennessy, Computer Organization and Design: The Hardware/Software Interface, Morgan Kaufmann, 2nd ed., 1998. [Rals03] Ralston, A., E. D. Reilly, and D. Hemmendinger (eds.), Encyclopedia of Computer Science, Wiley, 4th ed., 2003. [Siew82] Siewiorek, D. P., C. G. Bell, and A. Newell, Computer Structures: Principles and Examples, McGraw-Hill, 1982. [Sohi98] Sohi, G. (ed.), 25 Years of the International Symposia on Computer Architecture: Selected Papers, ACM Press, 1998. [Stal03] Stallings, W., Computer Organization and Architecture, Prentice Hall, 6th ed., 2003. [Swar76] Swartzlander, E. E., Jr (ed.), Computer Design Development: Principal Papers, Hayden, 1976. [TrCo] IEEE Trans. Computers, journal published by the IEEE Computer Society. [TrPD] IEEE Trans. Parallel and Distributed Systems, journal published by the IEEE Computer Society. [Wilk95] Wilkes, M. V., Computing Perspectives, Morgan Kaufmann, 1995. Return to: Top of this page Contents at a Glance
Return to: Top of this page Presentations The following PowerPoint presentations (1-2 MB each), and equivalent pdf files, are updated periodically by the author. Note that any animation in the PowerPoint presentations is lost in the pdf versions.
Return to: Top of this page Complete
Table of Contents Note: Each chapter ends with problems followed by references and further readings. Part I Background and Motivation1 Combinational Digital Circuits
2 Digital Circuits with Memory
3 Computer System Technology
4 Computer Performance
Part II Instruction-Set Architecture5 Instructions and Addressing
6 Procedures and Data
7 Assembly Language Programs
8 Instruction-Set Variations
Part III The Arithmetic/Logic Unit9 Number Representation
10 Adders and Simple ALUs
11 Multipliers and Dividers
12 Floating-Point Arithmetic
Part IV Data Path and Control13 Instruction Execution Steps
14 Control Unit Synthesis
15 Pipelined Data Paths
16 Pipeline Performance Limits
Part V Memory System Design17 Main Memory Concepts
18 Cache Memory Organization
19 Mass Memory Concepts
20 Virtual Memory and Paging
Part VI Input/Output and Interfacing21 Input/Output Devices
22 Input/Output Programming
23 Buses, Links, and Interfacing
24 Context Switching and Interrupts
Part VII Advanced Architectures25 Road to Higher Performance
26 Vector and Array Processing
27 Shared-Memory Multiprocessing
28 Distributed Multicomputing
IndexReturn to: Top of this page From
the Preface to the Instructor's Solutions Manual This manual, which presents solutions to selected problems in the text Computer Architecture: From Microprocessors to Supercomputers (Oxford University Press, 2005, ISBN 0-19-515455-X), is available free of charge to instructors who adopt the text. [Please contact the publisher via http://www.oup.com/us/highered]. All other teaching material for the text are available from the Web page below which is maintained by the author (note the upper-case “F” and “P” and the underscore symbol after “text” and “comp”):
http://www.ece.ucsb.edu/Faculty/Parhami/text_comp_arch.htm
In the book's Web page, instructors and students can find the following items related to the text:
Preface; including book’s features and general references Contents at a glance Downloadable PowerPoint presentations covering the seven parts of the text Complete table of contents List of corrections and additions for the book and for this manual
The author would appreciate the reporting of any error in the textbook or in this manual, suggestions for additional problems, alternate solutions to solved problems, solutions to other problems, and sharing of teaching experiences. Please e-mail your comments to parhami@ece.ucsb.edu or send them by regular mail to the author’s postal address:
Department of Electrical and Computer Engineering University of California Santa Barbara, CA 93106-9560, USA
Contributions will be acknowledged to the extent possible. Behrooz Parhami Santa Barbara, January 2005
Return to: Top of this page List of Errors and Additions for the Book This list is presented in three sections. The first section contains a list of critical errors which must be corrected by the reader. The second section contains a list of noncritical corrections and cosmetic improvements. The third section contains additional material and teaching/learning ideas. Each section is organized by page numbers in the book. (Scroll down to see the list of errors and additions for the solutions manual) Critical errors that must be corrected p. 41 In Table 3.1, "Y yotta" and "y yocto" correspond to 10^24 and 10^-24, respectively. Insert "Z zetta" and "z zepto" in their place. p. 90 In Figure 5.6, switch the 5-bit values for the rs and rt fields (10000 for rs, 01000 for rt). p. 93 Add the following statement to the end of the middle paragraph that begins with "For the j instruction ...": Given that, in practice, PC is usually incremented very early in the instruction execution cycle (before instruction decoding and execution), we assume that the 4 high-order bits of the incremented PC are used to augment the 26-bit address field. p. 93 In Figure 5.9 (middle left), change "From PC" to "From the incremented PC". p. 98 In the column of Table 5.1 headed "Meaning," for the instruction "Set less than," replace "(rs) < (rd)" with "(rs) < (rt)". p. 109 On line -8, 4($fp), 8($fp), and 12($fp) should be changed to -4($fp), -8($fp), and -12($fp). p. 110 In the machine language program segment near the top of the page, change the last lw instruction to have the address -4($sp). This is needed because the stack pointer has already been restored to its original value. p. 134 Near the top of Figure 7.3, the oval superimposed on the menu bar should be elongated to enclose "Window" as well. Also, the leftmost four buttons on the tools bar should be marked with the symbols for "file" (1, instead of 1), "floppy disk" (<, instead of <), "document" (3, instead of ?), and "hand" (I, instead of | ). The rightmost two buttons with "question mark" and "arrow, question mark" are correctly marked. p. 137 On line 6 of Problem 7.8, change [0, 65, 536] to [0, 65 536]; this is an interval notation, not a list of three numbers. p. 152 (This, and the next few errors on pp. 152-153 were brought to the author's attention by Dr. Jim Diamond of Acadia University) After line 11 (that begins with "start:"), insert the line : urisc temp,temp,+1 # temp = 0 p. 152 Change lines 12 and 13 (that follow the line "start: . . .") to the following: urisc temp,src,+1 # temp = -(src) urisc dest,temp,+1 # dest = -(temp); that is, (src) p. 152 On lines -7, -6, -4, and -1, swap the first two arguments that follow urisc (e.g., change "src1,at1" to "at1,src1"). p. 153 On lines 1, 4, 5, and 7, swap the first two arguments that follow urisc (e.g., change "src2,at2" to "at2,src2"). p. 153 In Example 8.2, change the solutions to parts d and e to the following: partd: urisc at1,at1,+1 # at1 = 0 urisc at2,at2,+1 # at2 = 0 urisc at1,src1,+1 # at1 = -(src1) urisc at2,at1,+1 # at2 = -(at1); that is, (src1) urisc at2,src2,+2 # if (src1)-(src2) < 0, skip 2 instr's urisc at1,at1,+1 # at1 = 0 urisc at1,one,label # at1 = -1, to force jump parte: urisc at1,at1,+1 # at1 = 0 urisc at2,at2,+1 # at2 = 0 urisc at1,src1,+1 # at1 = -(src1) urisc at2,at1,+1 # at2 = -(at1); that is, (src1) urisc at2,src2,+5 # if (src1)-(src2) < 0, skip 4 instr's urisc at1,at1,+1 # at1 = 0 urisc at1,at2,+3 # if (src2)-(src1) < 0, skip 2 instr's urisc at1,at1,+1 # at1 = 0 urisc at1,one,label # at1 = -1, to force jump p. 208 In Figure 11.10a, change the values of y3 and y0 to 1. p. 212 The second row of MS cells in Figure 11.14 are missing two right-to-left arrows (compare to other rows). p. 221 On line -3, before example 12.1, change "multiplied" to "multiplied by". p. 232 In the lower half of Figure 12.10, the fn field should contain 11xxx0, not 000110. p. 244 In the column of Table 13.1 headed "Meaning," for the instruction "Set less than," replace "(rs) < (rd)" with "(rs) < (rt)". p. 250 In Figure 13.4, the 4 MSBs of PC must be taken from the output of the adder, rather than from the lower input to the adder (i.e., the incremented PC value must be used). See the corrected version of Figure 13.4 in the ppt or pdf presentation for Part IV. p. 256 In part b of Problem 13.6, "pairs or rows" should be "pairs of rows". p. 260 On line -11, change "The 3-input" to "The upper 3-input". p. 260 On line -10, change "The 2-input" to "The 3-input". p. 260 On lines -9 and -8, change "cache or output of the ALU" to "cache, output of the ALU, or content of PC". p. 260 On lines -7 and -6, delete the sentence that begins with "The reason for having". p. 261 (The need for this and several related changes on pp. 260-269 was brought to the author's attention by Dr. Michael P. Frank of FAMU/FSU.) In Figure 14.3, the lower (2-input) multiplexer next to the register file must be changed to a 3-input mux. Inputs 0 and 1 remain as shown; input 2 comes from the PC output. See the corrected version of Figure 14.3 in the ppt or pdf presentation for Part IV. p. 262 Table 14.1, third in the group of three lines labeled "Register file": Change "RegInSrc" to "RegInSrc1, RegInSrc0" and enter "PC" in the column titled "2". p. 262 On line -17 that begins with "00", change "SysCallAddr" to "SysCallAddr|00". p. 262 On line -13 that begins with "Note that", insert "or SysCallAddr" between "jta" and "with 00". At the end of the line, add the new sentence "Also, PC31-28 refers to the 4 high-order bits of PC after incrementation." p. 262 On lines -2 and -1, change "Figure 14.3," to "Figure 13.3." and remove the rest of the sentence, beginning with "except that". p. 263 Table 14.2, rightmost column, after line -7 (second line of jump instruction in cycle 3) add a third line: "(for jal, see Figure 14.4) p. 264 Figure14.4, next to last line in Notes for State 5: Change "RegInSrc = 1" to "RegInSrc = 2". p. 268 In Figure 14.6, the field labeled RegInSrc should be expanded from 1 bit to 2 bits (with a horizontal line drawn under the 2-bit field). In the caption, "22-bit" should be changed to "23-bit". p. 269 Table 14.3, the line that begins with "Register control": The four boldface numerical entries should be (from left to right) "10000", "10001", "10101", "11010". p. 269 Table 14.3, the line that begins with "ALU inputs*": The last entry on the right, which is now blank, should include "x10" on top and "(imm)" below it p. 270 In Figure 14.8, line 1, remove "PC + 4" (it is redundant) p. 273 Problem 14.2, part a: Replace the first two sentences, and the beginning of the third, with: "The multiplexers feeding the register file have three settings each; thus, there are nine combinations when the settings are taken together. For each of these nine . . ." p. 274 Problem 14.10, part b should read: Show that even though the performance benefit derived in part a is an increasing function of h, the speedup factor tends to a constant for large h. p. 274 Problem 14.10, part d: Delete ", as was the case in part b". p. 287 (The need for this and several related changes on pp. 288-290 was brought to the author's attention by Dr. Lou Hafer of Simon Fraser Univ.) Figure 15.9 needs the following corrections. The pipeline registers between stages 2 and 3 should be extended at the top to include another 32-bit segment whose input is connected to (rt) and whose output is connected to a similar register added between stages 3 and 4. The output of this latter register feeds the data input of the data cache (with the current connection coming from below removed). See the corrected version of Figure 15.9 in the ppt or pdf presentation for Part IV. p. 288 At the end of the second paragraph, beginning with "Pipeline stage 3" add the sentence: "For sw instruction, the content of rt will be needed in stage 4 and is thus simply carried over in the top pipeline register." p. 289 Table 15.1: In the top line of the column headings, change "top(2-3)" to "middle(2-3)" and "top(3-4)" to "middle(3-4)". Place an asterisk after the table caption and add the following note at the bottom of the table: "*Note: Contents of the top pipeline registers between stages 2-3 and 3-4 are irrelevant in this example and are thus not shown." p. 290 Figure 15.10 needs the following corrections (same as those for Figure 15.9 on p. 287). The pipeline registers between stages 2 and 3 should be extended at the top to include another 32-bit segment whose input is connected to (rt) and whose output is connected to a similar register added between stages 3 and 4. The output of this latter register feeds the data input of the data cache (with the current connection coming from below removed). See the corrected version of Figure 15.10 in the ppt or pdf presentation for Part IV. p. 294 Problem 15.3: Change the second "stages versus cycles" to "stages versus instructions". p. 301 Table 16.1: Change the two 0s in the column titled "s2matchesd3" to 1s. p. 409 Problem 21.9, part a, should refer to Example 21.2 (not 21.1). p. 512 In the second parallel algorithm, in Courier font near the middle of the page, the assignment statement for Z[j + s] should read Z[j + s] := Z[j] + Z[j + s] (not X[j] + X[j + s]).
Noncritical corrections and cosmetic improvements (do not affect understanding of the material) p. 11 On line 3 of Section 1.4, change "Part III" to "Part 3". p. 13 On line 5, change "If a decoder" to "If an encoder". p. 17 In Problem 1.5, line 3, change "in all case" to "in each case". p. 44 On line 18, change "FLOPS" to "MFLOPS". p. 64 In the three indented paragraphs near the middle of the page, and on line -15, change "Part II" to "Part 2" (one instance), "Part III" to "Part 3" (two instances), and "Part IV" to "Part 4" (three instances). p. 85 On line 4, change "Part IV" to "Part 4". p. 105 The arrow going from Procedure xyz to Procedure abc should point to the instruction immediately after jal xyz, instead of to jr $ra. p. 109 On the left edge of Figure 6.5, $fp and the arrow next to it should be moved down by 0.2 cm to point to the first word in the shaded area, rather than to its top boundary. p. 110 In the machine language program segment near the top of the page, change the last two sw instructions and the first two lw instructions to have addresses -8($fp), -12($fp), -12($fp), and -8($fp), respectively. Recall that addresses are stable relative to the frame pointer, whereas the use of the stack pointer as shown assumes that the procedure has returned the stack pointer to where it was after the three registers $fp, $ra, $s0 were saved. p. 117 On line -8, change "Part III" to "Part 3". p. 125 At the right edge of Figure 7.2 (in the column labeled fn), the fourth entry from the top, which is 001100, should be 000011. This is because the branch offset (relative to the next instruction) is supplied in words rather than bytes. p. 134 On line -4, change "Part IV" to "Part 4". p. 149 Near the middle of the page, change Part IV to Part 4. p. 151 In the last three lines, replace "operand1" by "source1", "operand2" by "source2" (two instance), and "with the result" by "with the result of subtraction". p. 165 In example 9.5, line 3 of the solution, remove the extra space between the two consecutive 1s (i.e., the bits in 10110101 should be equally spaced). p. 168 In example 9.7, line 3 of the solution, remove the extra space between the two consecutive 1s (i.e., the bits in 10110101 should be equally spaced). p. 168 In example 9.8, line 4 of the solution, remove the extra spaces between the two consecutive 0s and the two consecutive 1s (i.e., the bits in 01001011 should be equally spaced). p. 169 On the last line, change "a the sign bit" to "as the sign bit". p. 188 In Figure 10.4, put a tick mark on the bottom output s[a, b], indicating that it represents a bundle of b - a + 1 signals. Also, add a mux to select the cout signal from one of the two adders as cb+1 based on the value of ca. p. 204 On line 8 of Section 11.3, change Part IV to Part 4. p. 213 On line 14 of Section 11.6, change Part IV to Part 4. p. 244 On line 2 of Section 13.1, change "Part II" to "Part 2". p. 244 On the last line, just before Table 13.1, change "filed" to "field". p. 248 In Figure 13.3, add arrowhead to all multiplexer inputs for consistency (5 instances). p. 248 On line 1, change "some the details" to "some of the details". p. 261 In Figure 14.3, add arrowheads to the inputs of the leftmost three multiplexers (for consistency with the others); eight arrowheads, altogether, after the critical change suggested for this figure has been made. p. 262 On line 9, after Table 14.1, change "selects on of the four" to "selects one of the four". p. 269 In Figure 14.7, bottom right, there are 20 solid arrows pointing downward and labeled "Control signals to data path"; there should be 21 arrows. p. 271 On line 3 of the final paragraph before Section 14.6, change "20 control signals" to "21 control signals". p. 300 On line -16, replace "move to stage 3." with "move to stage 3, where it performs an ALU operation." p. 325 On line 3, after Figure 17.9, change "Part VII" to "Part 7". p. 396 On line 3, after Figure 21.3, change "several time" to "several times". p. 434 On line 12 from the bottom, change "according the control" to "according to the control". p. 469 Change the caption of Fig. 25.1 to: "Trend in computational performance per watt of power used in general-purpose processors and DSPs."
Additional material and teaching/learning ideas p. 102 At the top of the page, add the new problem: 5.19 Logic instructions (see Problem 5.11 for format) The following program fragment leads to a branch decision based on the contents of $s0 and $s1. Assuming that the temporary values in $t0 and $t1 are not needed anywhere else in the program, propose a simpler way of achieving the same end result. and $t0,$s0,$s1 or $t1,$s1,$s0 beq $t0,$t1,done p. 312 Add the new problem: 16.18 Data forwarding and hazard detection In our discussion of data forwarding (Figure 16.4) we considered supplying the most recent or up-to-date version of register data only to the ALU. Because the content of a register is also used in a sw instruction, forwarding must be extended to the data cache unit as well. a. Discuss the design of a forwarding unit that ensures correct data input to the data cache. b. Do we need to extend the data hazard detector of Figure 16.5 for this purpose as well? p. 352 At the top of the page, add the new problem: 18.18 Augmented Caching Schemes Because direct-mapped caches are prone to numerous conflict misses in worst-case scenarios when several often-used pieces of data contend for the same cache line, a number of caching schemes have been developed in which a small fully associative cache augments a direct-mapped one. In one such scheme, a replaced line from the direct-mapped cache is moved to a fairly small, fully associative victim cache [Joup90], where it can be accessed rapidly in the event that it is needed shortly after replacement. Another augmented scheme uses a fully associative assist cache [Kurp94] which holds high-utility data, beginning with their first use, with replaced data moved to a direct-mapped cache. a. Describe how the use of a small victim cache can lead to a significant reduction in the number of main memory accesses. b. Repeat part a for an assist cache. c. Briefly compare the organization, benefits, and drawbacks of victim and assist caches. [Also add corresponding index entries for the added problem 18.18: Assist cache. Augmented cache. Cache, assist. Cache, victim. Victim cache.] p. 352 Add the following new references and further readings: [Joup90] Jouppi, N.P., “Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-Associative Cache and Prefetch Buffers,” Proc. 17th Int’l Symp. Computer Architecture, May 1990, pp. 364-373. [Kurp94] Kurpanek, G., K. Chan, J. Zheng, E. DeLano, and W. Bryg, “PA7200: A PA-RISC Processor with Integrated High Performance MP Bus Interface,” Proc. CompCon, February 1994, pp. 375-382. [Pier99] Peir, J.-K., W.W. Hsu, and A.J. Smith, “Functional Implementation Techniques for CPU Cache Memories,” IEEE Trans. Computers, Vol. 48, No. 2, pp. 100-110, February 1999. p. 367 A very readable account of developments in probe storage (nano- and MEM-based mass memory), that complements [Vett02] already cited, appeared in the March 2005 issue of IEEE Spectrum (Vol. 42, No. 3, pp. 32-39). In this article [Gold05], entitled "The Race to the Bottom," Harry Goldstein sketches the race between IBM and a small start-up company ( http://www.nanochip.com ), to introduce the first commercial product offering mass memory on a chip. p. 370 Add the new reference: [WWW] For comprehensive information about disk memory technology, see: http://www.storageview.com/guide/ p. 425 At the end of Section 22.6, add: An effort to merge a variety of proprietary processor buses, local I/O buses, and backplane buses into a low-cost interconnect scheme for embedded systems was undertaken by the RapidIO Trade Association (since 2000; members include Alcatel, Ericsson, Freescale/Motorola, Lucent, TI, Tundra). The resulting open standard uses packet-based communication involving request, response, and ack packets. A request/response packet may hold 1-256 B of data payload. Typical overhead per packet is 10-16 B; an ack packet uses a total of 4 B. For further information, see [Full05] Fuller, S., RapidIO: The Embedded System Interconnect, Wiley, 2005, or: http://www.rapidio.org/education/ p. 480 After the last complete paragraph -- Examples of applications that can benefit from the greater computational power of graphics processors are discussed in a short article: [Mano05] Manocha, D., “General-Purpose Computations Using Graphics Processors,” IEEE Computer, Vol. 38, No. 8, pp. 85-88, August 2005.
List of Errors and Additions for the Solutions Manual p. 15 In the solution to Problem 5.9, part d is mislabeled as part a. p. 16 In the solution to Problem 5.16, part a, register $s3 should be assumed to hold the constant 5256. p. 19 In the solution to part a of Problem 6.9, change "desires" to "desired". p. 36 Remove the redundant part c just before the solution to Problem 11.4. p. 40 In the solution to Problem 12.4, remove smudges between the tables. p. 53 In the solution to part b of Problem 16.10 change $s1 to $s2 in the first instruction and $s2 to $s1 in the fourth instruction. An alternate correction is changing bne to beq, but the comments must be changed accordingly and the correspondence with part a is lost. p. 57 In the solution to Problem 17.5, line 1, Figure 17.14 should be referenced (not Figure 17.4). p. 60 In the solution to Problem 18.10, change the first table entry in the column headed "Offset bits" (part a) to 2; in the last line of the table (part f), switch the numbers 2 and 4. p. 66 In the solution to Problem 20.12, change the fourth entry from the bottom in the rightmost table column (part b, Approx LRU) from E1A1B1C1 to E1A1B1C*1. The entries in the next to last row should read (from left to right): E, CDE, CDE*, E1C1D1, ABCE*, BCDE*, D1E*1B0C0. The entries in the last row (Page faults) should read: 9, 10, 9, 10, 8, 10. Return to: Top of this page || Go up to: B. Parhami's teaching and textbooks or his home page
|
|