SlideShare a Scribd company logo
1 of 22
General Pipelines:
Concepts
Dr. Prasenjit Dey
Two types of pipelines
 Linear pipeline
 Non-linear Pipeline
 Non-linear pipelines are also known as general pipeline
Linear Pipeline
 Streamline (cascade) connections of processing stages
 Performs a fixed function
 Contain k processing stages
 External input fed in at stage S1
 Final result emerges from stage Sk
 Asynchronous model
General Pipeline
 Contains feed forward/feedback connections
 Making pipeline a nonlinear one
 Multiple paths
 Parallel usage of multiple storages
 Can implement variable functions at different times by
reconfigurations
 Same pipeline can be used to evaluate different functions by
following different dataflow patterns,
Reservation Table
 Shows the utilization pattern of successive pipeline stages
 Represents the data flow through the pipeline for one complete
evaluation of a given function
 Represented by a matrix, where rows represent stages and
columns represent clock cycles
 Multiple reservation tables for different functions
 One to many mapping between pipeline configuration and
reservation tables
1 2 3 4 5 6 7 8
S1 X X x
S2 X x
S3 X x X
Reservation table for function x
Formation of Reservation Table
1 2 3 4 5 6 7 8
S1 X X x
S2 X x
S3 X x X
Reservation table for function x
1 2 3 4 5 6
S1 Y Y
S2 Y
S3 Y Y Y
Reservation table for function Y
Latency
 An initiation refers to the start of a function evaluation, and the
latency refers to the number of time units between two
initiations
 Any attempt by two or more initiations to use the same pipeline
stage at the same time causes a collision (resource conflict
between two initiations)
 Collision causing latencies are called forbidden latencies
 To detect forbidden latencies, check distance between any two
marks in the same row of the reservation table, e.g., 2,4,5 for
reservation table X
Computation of forbidden
latencies
 S1: {(6-1), (8-1), (8-6)} = {5, 7, 2}
 S2: {(4-2) = {2}
 S1: {(5-3), (7-5), (7-3)} = {2, 4, 2}
 Forbidden latencies = {2, 4, 5, 7}
 Latencies that does not cause collisions are called permissible
latencies
 permissible latencies = {1, 3, 6, 8}, as total number of clock = 8
1 2 3 4 5 6 7 8
S1 X X x
S2 X x
S3 X x X
Collisions with forbidden
latencies
1 2 3 4 5 6 7 8 9 10
S1 X1 X2 X3 X1 X4 x1X2 X2X3
S2 X1 X1X2 X2X3 X3X4
S3 X1 X1X2 X1X2X3 X2X3X4
Collisions with scheduling latency 2
Latency Analysis
 The sequence of permissible latencies between successive task
initiations are called latency sequence
 Latency sequence that repeats the same cycle indefinitely are
called latency cycle
 Average latency of a cycle can be computed by dividing sum of all
latencies by number of latencies in cycle
 Latency cycle (1, 6) has average latency =(1+6)/2 = 3.5
 Some latency cycles contain only one latency value, these are
called constant cycle
 constant cycle = (3)
Demonstration of latency
cycles
Latency cycle (1, 8) = 1, 8, 1, 8, 1, 8, …, with avg. latency 4.5
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
S
1
X
1
X
2
X
1
X
2
X
1
X
2
X
3
X
4
X
3
X
4
X
3
X
4
S
2
X
1
X
2
X
1
X
2
X
3
X
4
X
3
X
4
S
3
X
1
X
2
X
1
X
2
X
1
X
2
X
3
X
4
X
3
X
4
X
3
X
4
Cycle repeats (1,8)
Collision free scheduling
 To avoid collisions, all tasks should be scheduled properly
 The objective is to achieve shortest average latency between
initiations without causing collisions
 Steps to achieve shortest average latency are
 Computation of collision vector
 Formation of State diagram
 Computation of greedy cycles
 Computation of Minimum Average Latency (MAL)
Collision Vectors
 An m-bit binary vector c = (cm, cm-1, …, c2, c1), m is the maximum
forbidden latency
 E.g., c = 1011010
 m  n-1, where n is the number of clock cycles
 Displays set of permissible & forbidden latencies
 Ci = 1 if latency i causes collision
 Ci = 0 for permissible latencies
 Cm = 1 always (max forbidden latency)
Illustration
 Maximum forbidden latency(m) = 7
 7-bit collision vector (c) = (c7 c6 c5 c4 c3 c2 c1)
 Forbidden latencies = {2, 4, 5, 7}
 Permissible latencies = {1, 3, 4, 6}
 Collision vector = (c7 c6 c5 c4 c3 c2 c1)
(1 0 1 1 0 1 0)
1 2 3 4 5 6 7 8
S1 X X x
S2 X x
S3 X x X
State Diagrams
 Constructed from collision vector
 Specifies permissible state transitions among successive initiations
based on collision vector
 The collision vector at the initial state of the pipeline is called Initial
collision vector (ICV)
 Allowed State Transitions
 Permissible latencies = {1, 3, 6, 8+}, 8+ indicates that any latency beyond
maximum clock cycle is permissible
 State transitions of the collision vector are allowed for these bit positions
in a collision vector
 Next state of the collision vector can be obtained by making these
transitions
Steps to Draw State Diagrams
 To obtain the next state of the collision vector
 Right shift the collision vector of the present state for each transition =
{1, 3, 6, 8+}
 Ored the right shifted collision vector of the of the present states with
ICV
 ICV = (1011010)
 Possible state transitions = {1, 3, 6, 8+}
 Next state for transition =1
 1011010 0101101
 0101101 OR 1011010(ICV) = 1111111
1 bit right shift
1011010
1111111
1
State Diagrams
Greedy Cycles
 Simple cycles: a latency cycle in which each state appears only
once
 Greedy cycles: Is a simple cycle whose edges are all made with
minimum latencies from their respective starting states
 Their average latencies must be lower than those of other simple
cycles
MAL (Minimum Average Latency)
 It is the minimum average latency obtained from the greedy cycle
 Lower bounded by max number of checkmarks in any row of
reservation table
 Lower than or equal to avg. latency of any greedy cycle in the state
diagram
 Average latency of any greedy cycle is upper-bounded by number
of 1’s in the initial collision vector + 1.
Schedule Optimization
 As greedy cycle not sufficient for optimality of MAL, lower bound on
MAL is required
 Optimize the reservation table to obtain the lower bound
Reference
 Hwang, Kai, and A. Faye. "Computer architecture and parallel
processing." (1984).
 Hennessy, John L., and David A. Patterson. Computer architecture:
a quantitative approach. Elsevier, 2011.
Thank you

More Related Content

What's hot

Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection NetworkHeman Pathak
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer NetworkHitesh Mohapatra
 
recursive transition_networks
recursive transition_networksrecursive transition_networks
recursive transition_networksRajendran
 
Token, Pattern and Lexeme
Token, Pattern and LexemeToken, Pattern and Lexeme
Token, Pattern and LexemeA. S. M. Shafi
 
Pipeline hazard
Pipeline hazardPipeline hazard
Pipeline hazardAJAL A J
 
system interconnect architectures in ACA
system interconnect architectures in ACAsystem interconnect architectures in ACA
system interconnect architectures in ACAPankaj Kumar Jain
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Meenakshi Paul
 
Network lab manual
Network lab manualNetwork lab manual
Network lab manualPrabhu D
 
DATA RATE LIMITS
DATA RATE LIMITSDATA RATE LIMITS
DATA RATE LIMITSChAwais15
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHAREKhushboo Pal
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 

What's hot (20)

Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
Daa notes 3
Daa notes 3Daa notes 3
Daa notes 3
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
recursive transition_networks
recursive transition_networksrecursive transition_networks
recursive transition_networks
 
Token, Pattern and Lexeme
Token, Pattern and LexemeToken, Pattern and Lexeme
Token, Pattern and Lexeme
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Pipeline hazard
Pipeline hazardPipeline hazard
Pipeline hazard
 
Data link layer
Data link layer Data link layer
Data link layer
 
Randomized algorithms ver 1.0
Randomized algorithms ver 1.0Randomized algorithms ver 1.0
Randomized algorithms ver 1.0
 
system interconnect architectures in ACA
system interconnect architectures in ACAsystem interconnect architectures in ACA
system interconnect architectures in ACA
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
Network lab manual
Network lab manualNetwork lab manual
Network lab manual
 
DATA RATE LIMITS
DATA RATE LIMITSDATA RATE LIMITS
DATA RATE LIMITS
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
Hamming code system
Hamming code systemHamming code system
Hamming code system
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 

Similar to General pipeline concepts

Numerical on general pipelines
Numerical on general pipelinesNumerical on general pipelines
Numerical on general pipelinesPrasenjit Dey
 
Linear Control Hard-Disk Read/Write Controller Assignment
Linear Control Hard-Disk Read/Write Controller AssignmentLinear Control Hard-Disk Read/Write Controller Assignment
Linear Control Hard-Disk Read/Write Controller AssignmentIsham Rashik
 
Stability and pole location
Stability and pole locationStability and pole location
Stability and pole locationssuser5d64bb
 
D0372027037
D0372027037D0372027037
D0372027037theijes
 
Attou. Sliding mode Control - MSAP
Attou. Sliding mode Control -  MSAPAttou. Sliding mode Control -  MSAP
Attou. Sliding mode Control - MSAPAttou
 
RedisDay London 2018 - CRDTs and Redis From sequential to concurrent executions
RedisDay London 2018 - CRDTs and Redis From sequential to concurrent executionsRedisDay London 2018 - CRDTs and Redis From sequential to concurrent executions
RedisDay London 2018 - CRDTs and Redis From sequential to concurrent executionsRedis Labs
 
The Controller Design For Linear System: A State Space Approach
The Controller Design For Linear System: A State Space ApproachThe Controller Design For Linear System: A State Space Approach
The Controller Design For Linear System: A State Space ApproachYang Hong
 
IE 425 Homework 10Submit on Tuesday, 12101.(20 pts) C.docx
IE 425 Homework 10Submit on Tuesday, 12101.(20 pts) C.docxIE 425 Homework 10Submit on Tuesday, 12101.(20 pts) C.docx
IE 425 Homework 10Submit on Tuesday, 12101.(20 pts) C.docxsheronlewthwaite
 
Convolutional Error Control Coding
Convolutional Error Control CodingConvolutional Error Control Coding
Convolutional Error Control CodingMohammed Abuibaid
 
Lec4 State Variable Models are used for modeing
Lec4 State Variable Models are used for modeingLec4 State Variable Models are used for modeing
Lec4 State Variable Models are used for modeingShehzadAhmed90
 
Ece 415 control systems, fall 2021 computer project 1
Ece 415 control systems, fall 2021 computer project  1 Ece 415 control systems, fall 2021 computer project  1
Ece 415 control systems, fall 2021 computer project 1 ronak56
 
Buck converter controlled with ZAD and FPIC for DC-DC signal regulation
Buck converter controlled with ZAD and FPIC for DC-DC signal regulationBuck converter controlled with ZAD and FPIC for DC-DC signal regulation
Buck converter controlled with ZAD and FPIC for DC-DC signal regulationTELKOMNIKA JOURNAL
 

Similar to General pipeline concepts (20)

Numerical on general pipelines
Numerical on general pipelinesNumerical on general pipelines
Numerical on general pipelines
 
Linear Control Hard-Disk Read/Write Controller Assignment
Linear Control Hard-Disk Read/Write Controller AssignmentLinear Control Hard-Disk Read/Write Controller Assignment
Linear Control Hard-Disk Read/Write Controller Assignment
 
Stability and pole location
Stability and pole locationStability and pole location
Stability and pole location
 
D0372027037
D0372027037D0372027037
D0372027037
 
Chapter10
Chapter10Chapter10
Chapter10
 
solver (1)
solver (1)solver (1)
solver (1)
 
Control assignment#2
Control assignment#2Control assignment#2
Control assignment#2
 
A010220109
A010220109A010220109
A010220109
 
Economia01
Economia01Economia01
Economia01
 
Economia01
Economia01Economia01
Economia01
 
Attou. Sliding mode Control - MSAP
Attou. Sliding mode Control -  MSAPAttou. Sliding mode Control -  MSAP
Attou. Sliding mode Control - MSAP
 
RedisDay London 2018 - CRDTs and Redis From sequential to concurrent executions
RedisDay London 2018 - CRDTs and Redis From sequential to concurrent executionsRedisDay London 2018 - CRDTs and Redis From sequential to concurrent executions
RedisDay London 2018 - CRDTs and Redis From sequential to concurrent executions
 
FinalReport
FinalReportFinalReport
FinalReport
 
The Controller Design For Linear System: A State Space Approach
The Controller Design For Linear System: A State Space ApproachThe Controller Design For Linear System: A State Space Approach
The Controller Design For Linear System: A State Space Approach
 
IE 425 Homework 10Submit on Tuesday, 12101.(20 pts) C.docx
IE 425 Homework 10Submit on Tuesday, 12101.(20 pts) C.docxIE 425 Homework 10Submit on Tuesday, 12101.(20 pts) C.docx
IE 425 Homework 10Submit on Tuesday, 12101.(20 pts) C.docx
 
Poster_submitted_final
Poster_submitted_finalPoster_submitted_final
Poster_submitted_final
 
Convolutional Error Control Coding
Convolutional Error Control CodingConvolutional Error Control Coding
Convolutional Error Control Coding
 
Lec4 State Variable Models are used for modeing
Lec4 State Variable Models are used for modeingLec4 State Variable Models are used for modeing
Lec4 State Variable Models are used for modeing
 
Ece 415 control systems, fall 2021 computer project 1
Ece 415 control systems, fall 2021 computer project  1 Ece 415 control systems, fall 2021 computer project  1
Ece 415 control systems, fall 2021 computer project 1
 
Buck converter controlled with ZAD and FPIC for DC-DC signal regulation
Buck converter controlled with ZAD and FPIC for DC-DC signal regulationBuck converter controlled with ZAD and FPIC for DC-DC signal regulation
Buck converter controlled with ZAD and FPIC for DC-DC signal regulation
 

More from Prasenjit Dey

Dynamic interconnection networks
Dynamic interconnection networksDynamic interconnection networks
Dynamic interconnection networksPrasenjit Dey
 
Machine Learning in Agriculture Module 6: classification
Machine Learning in Agriculture Module 6: classificationMachine Learning in Agriculture Module 6: classification
Machine Learning in Agriculture Module 6: classificationPrasenjit Dey
 
Machine Learning in Agriculture Module 3: linear regression
Machine Learning in Agriculture Module 3: linear regressionMachine Learning in Agriculture Module 3: linear regression
Machine Learning in Agriculture Module 3: linear regressionPrasenjit Dey
 
Machine learning in agriculture module 2
Machine learning in agriculture module 2Machine learning in agriculture module 2
Machine learning in agriculture module 2Prasenjit Dey
 
Machine Learning in Agriculture Module 1
Machine Learning in Agriculture Module 1Machine Learning in Agriculture Module 1
Machine Learning in Agriculture Module 1Prasenjit Dey
 
Support vector machine
Support vector machineSupport vector machine
Support vector machinePrasenjit Dey
 
Evaluation of computer performance
Evaluation of computer performanceEvaluation of computer performance
Evaluation of computer performancePrasenjit Dey
 
Instruction Set Architecture: MIPS
Instruction Set Architecture: MIPSInstruction Set Architecture: MIPS
Instruction Set Architecture: MIPSPrasenjit Dey
 
Page replacement and thrashing
Page replacement and thrashingPage replacement and thrashing
Page replacement and thrashingPrasenjit Dey
 
Register transfer and microoperations part 2
Register transfer and microoperations part 2Register transfer and microoperations part 2
Register transfer and microoperations part 2Prasenjit Dey
 
Instruction set (prasenjit dey)
Instruction set (prasenjit dey)Instruction set (prasenjit dey)
Instruction set (prasenjit dey)Prasenjit Dey
 
Register transfer and microoperations part 1
Register transfer and microoperations part 1Register transfer and microoperations part 1
Register transfer and microoperations part 1Prasenjit Dey
 
Different types of memory and hardware designs of RAM and ROM
Different types of memory and hardware designs of RAM and ROMDifferent types of memory and hardware designs of RAM and ROM
Different types of memory and hardware designs of RAM and ROMPrasenjit Dey
 
Carry look ahead adder
Carry look ahead adder Carry look ahead adder
Carry look ahead adder Prasenjit Dey
 
Binary division restoration and non restoration algorithm
Binary division restoration and non restoration algorithmBinary division restoration and non restoration algorithm
Binary division restoration and non restoration algorithmPrasenjit Dey
 
Computer organization basics and number systems
Computer organization basics and number systemsComputer organization basics and number systems
Computer organization basics and number systemsPrasenjit Dey
 

More from Prasenjit Dey (19)

Dynamic interconnection networks
Dynamic interconnection networksDynamic interconnection networks
Dynamic interconnection networks
 
Machine Learning in Agriculture Module 6: classification
Machine Learning in Agriculture Module 6: classificationMachine Learning in Agriculture Module 6: classification
Machine Learning in Agriculture Module 6: classification
 
Machine Learning in Agriculture Module 3: linear regression
Machine Learning in Agriculture Module 3: linear regressionMachine Learning in Agriculture Module 3: linear regression
Machine Learning in Agriculture Module 3: linear regression
 
Machine learning in agriculture module 2
Machine learning in agriculture module 2Machine learning in agriculture module 2
Machine learning in agriculture module 2
 
Machine Learning in Agriculture Module 1
Machine Learning in Agriculture Module 1Machine Learning in Agriculture Module 1
Machine Learning in Agriculture Module 1
 
Support vector machine
Support vector machineSupport vector machine
Support vector machine
 
Evaluation of computer performance
Evaluation of computer performanceEvaluation of computer performance
Evaluation of computer performance
 
Instruction Set Architecture: MIPS
Instruction Set Architecture: MIPSInstruction Set Architecture: MIPS
Instruction Set Architecture: MIPS
 
Page replacement and thrashing
Page replacement and thrashingPage replacement and thrashing
Page replacement and thrashing
 
Addressing mode
Addressing modeAddressing mode
Addressing mode
 
Register transfer and microoperations part 2
Register transfer and microoperations part 2Register transfer and microoperations part 2
Register transfer and microoperations part 2
 
Instruction set (prasenjit dey)
Instruction set (prasenjit dey)Instruction set (prasenjit dey)
Instruction set (prasenjit dey)
 
Register transfer and microoperations part 1
Register transfer and microoperations part 1Register transfer and microoperations part 1
Register transfer and microoperations part 1
 
Different types of memory and hardware designs of RAM and ROM
Different types of memory and hardware designs of RAM and ROMDifferent types of memory and hardware designs of RAM and ROM
Different types of memory and hardware designs of RAM and ROM
 
Cache memory
Cache  memoryCache  memory
Cache memory
 
Carry look ahead adder
Carry look ahead adder Carry look ahead adder
Carry look ahead adder
 
Binary division restoration and non restoration algorithm
Binary division restoration and non restoration algorithmBinary division restoration and non restoration algorithm
Binary division restoration and non restoration algorithm
 
Booth's algorithm
Booth's algorithm Booth's algorithm
Booth's algorithm
 
Computer organization basics and number systems
Computer organization basics and number systemsComputer organization basics and number systems
Computer organization basics and number systems
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

General pipeline concepts

  • 2. Two types of pipelines  Linear pipeline  Non-linear Pipeline  Non-linear pipelines are also known as general pipeline
  • 3. Linear Pipeline  Streamline (cascade) connections of processing stages  Performs a fixed function  Contain k processing stages  External input fed in at stage S1  Final result emerges from stage Sk  Asynchronous model
  • 4. General Pipeline  Contains feed forward/feedback connections  Making pipeline a nonlinear one  Multiple paths  Parallel usage of multiple storages  Can implement variable functions at different times by reconfigurations  Same pipeline can be used to evaluate different functions by following different dataflow patterns,
  • 5. Reservation Table  Shows the utilization pattern of successive pipeline stages  Represents the data flow through the pipeline for one complete evaluation of a given function  Represented by a matrix, where rows represent stages and columns represent clock cycles  Multiple reservation tables for different functions  One to many mapping between pipeline configuration and reservation tables 1 2 3 4 5 6 7 8 S1 X X x S2 X x S3 X x X Reservation table for function x
  • 6. Formation of Reservation Table 1 2 3 4 5 6 7 8 S1 X X x S2 X x S3 X x X Reservation table for function x 1 2 3 4 5 6 S1 Y Y S2 Y S3 Y Y Y Reservation table for function Y
  • 7. Latency  An initiation refers to the start of a function evaluation, and the latency refers to the number of time units between two initiations  Any attempt by two or more initiations to use the same pipeline stage at the same time causes a collision (resource conflict between two initiations)  Collision causing latencies are called forbidden latencies  To detect forbidden latencies, check distance between any two marks in the same row of the reservation table, e.g., 2,4,5 for reservation table X
  • 8. Computation of forbidden latencies  S1: {(6-1), (8-1), (8-6)} = {5, 7, 2}  S2: {(4-2) = {2}  S1: {(5-3), (7-5), (7-3)} = {2, 4, 2}  Forbidden latencies = {2, 4, 5, 7}  Latencies that does not cause collisions are called permissible latencies  permissible latencies = {1, 3, 6, 8}, as total number of clock = 8 1 2 3 4 5 6 7 8 S1 X X x S2 X x S3 X x X
  • 9. Collisions with forbidden latencies 1 2 3 4 5 6 7 8 9 10 S1 X1 X2 X3 X1 X4 x1X2 X2X3 S2 X1 X1X2 X2X3 X3X4 S3 X1 X1X2 X1X2X3 X2X3X4 Collisions with scheduling latency 2
  • 10. Latency Analysis  The sequence of permissible latencies between successive task initiations are called latency sequence  Latency sequence that repeats the same cycle indefinitely are called latency cycle  Average latency of a cycle can be computed by dividing sum of all latencies by number of latencies in cycle  Latency cycle (1, 6) has average latency =(1+6)/2 = 3.5  Some latency cycles contain only one latency value, these are called constant cycle  constant cycle = (3)
  • 11. Demonstration of latency cycles Latency cycle (1, 8) = 1, 8, 1, 8, 1, 8, …, with avg. latency 4.5 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 S 1 X 1 X 2 X 1 X 2 X 1 X 2 X 3 X 4 X 3 X 4 X 3 X 4 S 2 X 1 X 2 X 1 X 2 X 3 X 4 X 3 X 4 S 3 X 1 X 2 X 1 X 2 X 1 X 2 X 3 X 4 X 3 X 4 X 3 X 4 Cycle repeats (1,8)
  • 12. Collision free scheduling  To avoid collisions, all tasks should be scheduled properly  The objective is to achieve shortest average latency between initiations without causing collisions  Steps to achieve shortest average latency are  Computation of collision vector  Formation of State diagram  Computation of greedy cycles  Computation of Minimum Average Latency (MAL)
  • 13. Collision Vectors  An m-bit binary vector c = (cm, cm-1, …, c2, c1), m is the maximum forbidden latency  E.g., c = 1011010  m  n-1, where n is the number of clock cycles  Displays set of permissible & forbidden latencies  Ci = 1 if latency i causes collision  Ci = 0 for permissible latencies  Cm = 1 always (max forbidden latency)
  • 14. Illustration  Maximum forbidden latency(m) = 7  7-bit collision vector (c) = (c7 c6 c5 c4 c3 c2 c1)  Forbidden latencies = {2, 4, 5, 7}  Permissible latencies = {1, 3, 4, 6}  Collision vector = (c7 c6 c5 c4 c3 c2 c1) (1 0 1 1 0 1 0) 1 2 3 4 5 6 7 8 S1 X X x S2 X x S3 X x X
  • 15. State Diagrams  Constructed from collision vector  Specifies permissible state transitions among successive initiations based on collision vector  The collision vector at the initial state of the pipeline is called Initial collision vector (ICV)  Allowed State Transitions  Permissible latencies = {1, 3, 6, 8+}, 8+ indicates that any latency beyond maximum clock cycle is permissible  State transitions of the collision vector are allowed for these bit positions in a collision vector  Next state of the collision vector can be obtained by making these transitions
  • 16. Steps to Draw State Diagrams  To obtain the next state of the collision vector  Right shift the collision vector of the present state for each transition = {1, 3, 6, 8+}  Ored the right shifted collision vector of the of the present states with ICV  ICV = (1011010)  Possible state transitions = {1, 3, 6, 8+}  Next state for transition =1  1011010 0101101  0101101 OR 1011010(ICV) = 1111111 1 bit right shift 1011010 1111111 1
  • 18. Greedy Cycles  Simple cycles: a latency cycle in which each state appears only once  Greedy cycles: Is a simple cycle whose edges are all made with minimum latencies from their respective starting states  Their average latencies must be lower than those of other simple cycles
  • 19. MAL (Minimum Average Latency)  It is the minimum average latency obtained from the greedy cycle  Lower bounded by max number of checkmarks in any row of reservation table  Lower than or equal to avg. latency of any greedy cycle in the state diagram  Average latency of any greedy cycle is upper-bounded by number of 1’s in the initial collision vector + 1.
  • 20. Schedule Optimization  As greedy cycle not sufficient for optimality of MAL, lower bound on MAL is required  Optimize the reservation table to obtain the lower bound
  • 21. Reference  Hwang, Kai, and A. Faye. "Computer architecture and parallel processing." (1984).  Hennessy, John L., and David A. Patterson. Computer architecture: a quantitative approach. Elsevier, 2011.