< previous page page_vii next page >

Page vii
d87111c01013bcda00bb8640fdff6754.gif
3.4 Breaks in Machine Execution
156
d87111c01013bcda00bb8640fdff6754.gif
3.4.1 Instruction Run Length
156
d87111c01013bcda00bb8640fdff6754.gif
3.4.2 Branches
158
d87111c01013bcda00bb8640fdff6754.gif
3.4.3 Branch Target Distribution
161
d87111c01013bcda00bb8640fdff6754.gif
3.4.4 Condition Code Testing
163
d87111c01013bcda00bb8640fdff6754.gif
3.4.5 Move and Arithmetic Class Operations
164
d87111c01013bcda00bb8640fdff6754.gif
3.4.6 Register-Based Addressing
167
d87111c01013bcda00bb8640fdff6754.gif
3.4.7 Decimal and Character Operand Length
170
d87111c01013bcda00bb8640fdff6754.gif
3.5 Conclusions
174
d87111c01013bcda00bb8640fdff6754.gif
3.6 Some Areas for Further Research
174
d87111c01013bcda00bb8640fdff6754.gif
3.7 Data Notes
175
d87111c01013bcda00bb8640fdff6754.gif
3.8 Annotated Bibliography
176
d87111c01013bcda00bb8640fdff6754.gif
3.9 Problem Set
177
4
Pipelined Processor Design
181
d87111c01013bcda00bb8640fdff6754.gif
4.1 Introduction
181
d87111c01013bcda00bb8640fdff6754.gif
4.1.1 Evolution of a Computer Processor Family
182
d87111c01013bcda00bb8640fdff6754.gif
4.1.2 Processor Design
185
d87111c01013bcda00bb8640fdff6754.gif
4.1.3 Organization of the Chapter
185
d87111c01013bcda00bb8640fdff6754.gif
4.2 Approaching Pipelined Processors
186
d87111c01013bcda00bb8640fdff6754.gif
4.2.1 Examples of Pipeline Implementations
190
d87111c01013bcda00bb8640fdff6754.gif
4.3 Evaluating Pipelined Processor Performance
193
d87111c01013bcda00bb8640fdff6754.gif
4.4 Design of a Pipelined Processor
213
d87111c01013bcda00bb8640fdff6754.gif
4.4.1 Cache Access Controller
214
d87111c01013bcda00bb8640fdff6754.gif
4.4.2 Accounting for the Effect of Buffers in a Pipelined System
215
d87111c01013bcda00bb8640fdff6754.gif
4.4.3 Buffer Design
216
d87111c01013bcda00bb8640fdff6754.gif
4.4.4 Designing a Buffer for a Mean Request Rate
216
d87111c01013bcda00bb8640fdff6754.gif
4.4.5 I-Buffers Designed for Maximum Request Rates
219
d87111c01013bcda00bb8640fdff6754.gif
4.5 Branches
222
d87111c01013bcda00bb8640fdff6754.gif
4.5.1 Branch Elimination
225
d87111c01013bcda00bb8640fdff6754.gif
4.5.2 Branch Speedup
225
d87111c01013bcda00bb8640fdff6754.gif
4.5.3 Branch Prediction Strategies
226
d87111c01013bcda00bb8640fdff6754.gif
4.5.4 Branch Target Capture: Branch Target Buffers
236
d87111c01013bcda00bb8640fdff6754.gif
4.6 Interlocks
240
d87111c01013bcda00bb8640fdff6754.gif
4.6.1 Decoder and Interlocks
240
d87111c01013bcda00bb8640fdff6754.gif
4.6.2 Bypassing
241
d87111c01013bcda00bb8640fdff6754.gif
4.6.3 Address Generation Interlocks
242
d87111c01013bcda00bb8640fdff6754.gif
4.6.4 Execution Interlocks and Interlock Tables
243
d87111c01013bcda00bb8640fdff6754.gif
4.7 Run-On Delay
250

 
< previous page page_vii next page >