SlideShare a Scribd company logo
1 of 19
Presented by
Miss. Neha D. Jaiswal
Co-guided by Guided by
Prof. S.A. Fanan Prof.P.M.Pandit
lJAWAHARLAL DARDA INSTITUTE OF ENGINEERING & TECHNOLOGY, YAVATMAL
DEPARTMENT OF ELECTRONICS & TELECOMMUNICATION ENGINEERING
Contents
1. History
2. What is Power?
3. Compiler?
4. What is Cache Memory?
5. Introduction of microprocessor
6. Compiler Enhancement
7. How compiling done?
8. Hardware Enhancement
9. Energy Estimation
10. Conclusion
11. References
History
 In 1970, at Carnegie Mellon University, William. A. Wulf developed
optimizing compiler.
 He was founder and vice president of Tartan Laboratories,
a compiler technology company, in 1981.
What is Power?
 Power is the rate of doing work. It is the amount of energy
consumed per unit time.
In formal terms,
P = W/T……..(1)
E = P ∗ T…….(2)
where, P is power,
E is energy,
T is a specific time interval,
W is the total work performed in that interval.
• Power is measured in watts.
• For microprocessor, Power is the rate at which the computer
consumes electrical energy or dissipates it in the form of
heat.
Compiler
 A compiler is a special program that processes statements written in
a particular programming language and turns them into machine
language or "code" that a computer's processor uses.
 When executing the statements, the compiler first analyzes all of the
language statements one after the other and then ,builds the output
code.
 The output of the compilation has been called object code.
Fig. Process of compiling
What is Cache Memory?
 Cache memory is a small-sized type
of volatile computer memory.
 Cache provide high-speed data
access to a processor.
 It stores frequently used computer
programs, applications and data.
Introduction about Microprocessor
 Modern microprocessor are large power consumer-
• Ultra SPARK-II consumes 58W maximum power at 296MHz.
• Pentium Pro consumes 35W at 280MHz.
• Alpha 21164 PC consumes 32.5W at 433MHz.
 In microprocessor I-Cache subsystem which is one of the main
power consumers.
Fig:- I-cache
 For that an additional minicache i.e L-cache is used between the I-
Cache and the central processing unit (CPU) core and buffers
instructions that are nested within loops.
 In compiler technique for energy reduction code modifcations take
place, through the compiler, that greatly simplify the required
hardware, eliminate unnecessary instruction fetching, and consequently
reduce signal switching activity and the dissipated energy.
 The basic blocks are used a L-cache for proper distribution of
instruction according to their priority.
CPU L-cache Main
memory
How compiling done?
 The control flow graph is built
for describing each function of
the original program.
 The block placement algorithm
is shown in Fig.
 The input code & profile data is
as a input
Profile
data
Input
code
Nesting
comput.
For each BB
LableTree
construction
BB selection
and
placements
Global
placement
Branch
insertion
• The following sections give a detailed description for each block:
1.First Step: Nesting Computation:
 The tool finds the loops and the nesting for every basic block.
 Figure describe the data structure used & information produce.
 Loop nesting shown in fig. along with CFG & labelsets.
 Basic blocks within a loop which has a function call will not be eligible for
caching.
Fig. First step of block placement.
2. Second Step: LabelTree Construction
 The LabelTree describes the nesting relationship
between basic blocks.
Fig. LableTree.
3.Third Step: Basic Block Selection and Placement
• In this compiler know the how many maximum basic
block can place in a cache.
• In this step algorithm is done which scans the basic
blocks in descending order of execution frequency.
• The most important blocks are the first to be
considered and have a greater chance to be placed in
the L-Cache.
4.Fourth and Fifth Steps: Global Placement in the Memory
• In this placing basic blocks in the global address space.
• The algorithm takes as input the placement of the basic blocks with respect
to the L-Cache and tries to minimize the necessary space as much as
possible.
Fig. Placing blocks in cache
Hardware Enhancement
• To implement of L-cache scheme require hardware.
This is shown in fig.
• L-cache tag will only output if the
blocked part signal is on. This
signal is generated by the instruction
fetch unit (IFU).
• In that case, the comparator checks for
a match, and if it finds one, it instructs
the multiplexer to drive the contents
of the L-Cache in the data path. Fig. L-cache organisation
• At the same time, the data portion of the L-Cache asserts its
output and sends the new instruction to the data path. The I-
Cache is disabled for the clock cycle, since the signal blocked
part is on.
• If blocked part off, the I-Cache controller activates the I-Cache
without waiting for the L-Cache Hit signal. In this way, the L-
Cache can be bypassed without a delay penalty.
Energy Estimation
 In this modeluses run-time information of the cache
utilization i.e number of accesses, input statistics, etc.
 A 0.8- µm technology with 3.3-V voltage supply
is assumed.
 These models are used for the estimation of energy in
both the I-Cache and the L-Cache.
 By using of power-consuming modules of a CPU, the Cache
result in energy reduction.
 Reduce total energy consumption of microprocessor.
 Major energy gains can be obtained if the compiler and the
hardware are designed with low energy.
References
[1] J. Edmondon, “Internal organization of the Alpha 21164, a 300 MHz 64-bit quad-
issue CMOS RISC microprocessor,” Digital Tech. J., vol.7, no. 1, pp. 119–135, 1995.
[2] D. Dobberpuhl, “The design of a high-performance low-power microprocessor,” in
Proc. Int. Symp. Low Power Electronics and Design, 1996,pp. 11–16. [3] S. Manne, D.
Grunwald, and A. Klauser, “Pipeline gating: Speculation control for energy reduction,”
in Proc. Int. Symp. Computer Architecture, 1998, pp. 132–141.
[4] V. Tiwari, S. Malik, and A. Wolfe, “Power analysis of embedded soft-
ware: A first step toward software power minimization,” IEEE Trans.
VLSI Syst., vol. 2, pp. 437–445, Dec. 1994.
[5] V. Tiwari, S. Malik, A. Wolfe, and T. C. Lee, “Instruction level power
analysis and optimization of software,” J. VLSI Signal Processing, vol.
13, Aug. 1996.
THANK YOU

More Related Content

What's hot

Radial basis function network ppt bySheetal,Samreen and Dhanashri
Radial basis function network ppt bySheetal,Samreen and DhanashriRadial basis function network ppt bySheetal,Samreen and Dhanashri
Radial basis function network ppt bySheetal,Samreen and Dhanashrisheetal katkar
 
Modern processor art
Modern processor artModern processor art
Modern processor artwaqasjadoon11
 
Vector Supercomputers and Scientific Array Processors
Vector Supercomputers and Scientific Array ProcessorsVector Supercomputers and Scientific Array Processors
Vector Supercomputers and Scientific Array ProcessorsHsuvas Borkakoty
 
Evaluation of morden computer & system attributes in ACA
Evaluation of morden computer &  system attributes in ACAEvaluation of morden computer &  system attributes in ACA
Evaluation of morden computer & system attributes in ACAPankaj Kumar Jain
 
8085 microprocessor architecture mpi(mai)
8085 microprocessor architecture mpi(mai)8085 microprocessor architecture mpi(mai)
8085 microprocessor architecture mpi(mai)ravinlaheri2
 
Parallel Algorithms Advantages and Disadvantages
Parallel Algorithms Advantages and DisadvantagesParallel Algorithms Advantages and Disadvantages
Parallel Algorithms Advantages and DisadvantagesMurtadha Alsabbagh
 
ECML PKDD 2021 ML meets IoT Tutorial Part III: Deep Optimizations of CNNs and...
ECML PKDD 2021 ML meets IoT Tutorial Part III: Deep Optimizations of CNNs and...ECML PKDD 2021 ML meets IoT Tutorial Part III: Deep Optimizations of CNNs and...
ECML PKDD 2021 ML meets IoT Tutorial Part III: Deep Optimizations of CNNs and...Bharath Sudharsan
 
Electricity Demand Forecasting Using ANN
Electricity Demand Forecasting Using ANNElectricity Demand Forecasting Using ANN
Electricity Demand Forecasting Using ANNNaren Chandra Kattla
 
Applications of paralleL processing
Applications of paralleL processingApplications of paralleL processing
Applications of paralleL processingPage Maker
 
Multithreading: Exploiting Thread-Level Parallelism to Improve Uniprocessor ...
Multithreading: Exploiting Thread-Level  Parallelism to Improve Uniprocessor ...Multithreading: Exploiting Thread-Level  Parallelism to Improve Uniprocessor ...
Multithreading: Exploiting Thread-Level Parallelism to Improve Uniprocessor ...Ahmed kasim
 
Computer arithmetic in computer architecture
Computer arithmetic in computer architectureComputer arithmetic in computer architecture
Computer arithmetic in computer architectureishapadhy
 
Electricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural NetworkElectricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural NetworkNaren Chandra Kattla
 
Train++: An Incremental ML Model Training Algorithm to Create Self Learning I...
Train++: An Incremental ML Model Training Algorithm to Create Self Learning I...Train++: An Incremental ML Model Training Algorithm to Create Self Learning I...
Train++: An Incremental ML Model Training Algorithm to Create Self Learning I...Bharath Sudharsan
 
Computer Architecture: A quantitative approach - Cap4 - Section 8
Computer Architecture: A quantitative approach - Cap4 - Section 8Computer Architecture: A quantitative approach - Cap4 - Section 8
Computer Architecture: A quantitative approach - Cap4 - Section 8Marcelo Arbore
 
Parallel Processing
Parallel ProcessingParallel Processing
Parallel ProcessingRTigger
 

What's hot (20)

Introduction to parallel computing
Introduction to parallel computingIntroduction to parallel computing
Introduction to parallel computing
 
Parallel processing
Parallel processingParallel processing
Parallel processing
 
Radial basis function network ppt bySheetal,Samreen and Dhanashri
Radial basis function network ppt bySheetal,Samreen and DhanashriRadial basis function network ppt bySheetal,Samreen and Dhanashri
Radial basis function network ppt bySheetal,Samreen and Dhanashri
 
Modern processor art
Modern processor artModern processor art
Modern processor art
 
Vector Supercomputers and Scientific Array Processors
Vector Supercomputers and Scientific Array ProcessorsVector Supercomputers and Scientific Array Processors
Vector Supercomputers and Scientific Array Processors
 
Evaluation of morden computer & system attributes in ACA
Evaluation of morden computer &  system attributes in ACAEvaluation of morden computer &  system attributes in ACA
Evaluation of morden computer & system attributes in ACA
 
Aca2 08 new
Aca2 08 newAca2 08 new
Aca2 08 new
 
Aca2 09 new
Aca2 09 newAca2 09 new
Aca2 09 new
 
8085 microprocessor architecture mpi(mai)
8085 microprocessor architecture mpi(mai)8085 microprocessor architecture mpi(mai)
8085 microprocessor architecture mpi(mai)
 
Parallel Algorithms Advantages and Disadvantages
Parallel Algorithms Advantages and DisadvantagesParallel Algorithms Advantages and Disadvantages
Parallel Algorithms Advantages and Disadvantages
 
ECML PKDD 2021 ML meets IoT Tutorial Part III: Deep Optimizations of CNNs and...
ECML PKDD 2021 ML meets IoT Tutorial Part III: Deep Optimizations of CNNs and...ECML PKDD 2021 ML meets IoT Tutorial Part III: Deep Optimizations of CNNs and...
ECML PKDD 2021 ML meets IoT Tutorial Part III: Deep Optimizations of CNNs and...
 
Electricity Demand Forecasting Using ANN
Electricity Demand Forecasting Using ANNElectricity Demand Forecasting Using ANN
Electricity Demand Forecasting Using ANN
 
Applications of paralleL processing
Applications of paralleL processingApplications of paralleL processing
Applications of paralleL processing
 
A0270107
A0270107A0270107
A0270107
 
Multithreading: Exploiting Thread-Level Parallelism to Improve Uniprocessor ...
Multithreading: Exploiting Thread-Level  Parallelism to Improve Uniprocessor ...Multithreading: Exploiting Thread-Level  Parallelism to Improve Uniprocessor ...
Multithreading: Exploiting Thread-Level Parallelism to Improve Uniprocessor ...
 
Computer arithmetic in computer architecture
Computer arithmetic in computer architectureComputer arithmetic in computer architecture
Computer arithmetic in computer architecture
 
Electricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural NetworkElectricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural Network
 
Train++: An Incremental ML Model Training Algorithm to Create Self Learning I...
Train++: An Incremental ML Model Training Algorithm to Create Self Learning I...Train++: An Incremental ML Model Training Algorithm to Create Self Learning I...
Train++: An Incremental ML Model Training Algorithm to Create Self Learning I...
 
Computer Architecture: A quantitative approach - Cap4 - Section 8
Computer Architecture: A quantitative approach - Cap4 - Section 8Computer Architecture: A quantitative approach - Cap4 - Section 8
Computer Architecture: A quantitative approach - Cap4 - Section 8
 
Parallel Processing
Parallel ProcessingParallel Processing
Parallel Processing
 

Similar to A Seminar Presentation on Compiler Techniques for Energy Reduction in High-Performance Microprocessors

DESIGNED DYNAMIC SEGMENTED LRU AND MODIFIED MOESI PROTOCOL FOR RING CONNECTED...
DESIGNED DYNAMIC SEGMENTED LRU AND MODIFIED MOESI PROTOCOL FOR RING CONNECTED...DESIGNED DYNAMIC SEGMENTED LRU AND MODIFIED MOESI PROTOCOL FOR RING CONNECTED...
DESIGNED DYNAMIC SEGMENTED LRU AND MODIFIED MOESI PROTOCOL FOR RING CONNECTED...Ilango Jeyasubramanian
 
DESIGN AND ANALYSIS OF A 32-BIT PIPELINED MIPS RISC PROCESSOR
DESIGN AND ANALYSIS OF A 32-BIT PIPELINED MIPS RISC PROCESSORDESIGN AND ANALYSIS OF A 32-BIT PIPELINED MIPS RISC PROCESSOR
DESIGN AND ANALYSIS OF A 32-BIT PIPELINED MIPS RISC PROCESSORVLSICS Design
 
DESIGN AND ANALYSIS OF A 32-BIT PIPELINED MIPS RISC PROCESSOR
DESIGN AND ANALYSIS OF A 32-BIT PIPELINED MIPS RISC PROCESSORDESIGN AND ANALYSIS OF A 32-BIT PIPELINED MIPS RISC PROCESSOR
DESIGN AND ANALYSIS OF A 32-BIT PIPELINED MIPS RISC PROCESSORVLSICS Design
 
Design and Analysis of A 32-bit Pipelined MIPS Risc Processor
Design and Analysis of A 32-bit Pipelined MIPS Risc ProcessorDesign and Analysis of A 32-bit Pipelined MIPS Risc Processor
Design and Analysis of A 32-bit Pipelined MIPS Risc ProcessorVLSICS Design
 
Bca examination 2015 csa
Bca examination 2015 csaBca examination 2015 csa
Bca examination 2015 csaAnjaan Gajendra
 
Interplay of Communication and Computation Energy Consumption for Low Power S...
Interplay of Communication and Computation Energy Consumption for Low Power S...Interplay of Communication and Computation Energy Consumption for Low Power S...
Interplay of Communication and Computation Energy Consumption for Low Power S...ijasuc
 
Micro controller and dsp processor
Micro controller and dsp processorMicro controller and dsp processor
Micro controller and dsp processorShubhamMishra485
 
Low Power System on chip based design methodology
Low Power System on chip based design methodologyLow Power System on chip based design methodology
Low Power System on chip based design methodologyAakash Patel
 
CA UNIT I PPT.ppt
CA UNIT I PPT.pptCA UNIT I PPT.ppt
CA UNIT I PPT.pptRAJESH S
 
Data cache design itanium 2
Data cache design itanium 2Data cache design itanium 2
Data cache design itanium 2Léia de Sousa
 
Chapter 4 Microprocessor CPU
Chapter 4 Microprocessor CPUChapter 4 Microprocessor CPU
Chapter 4 Microprocessor CPUaskme
 
8051 microcontroller
8051 microcontroller8051 microcontroller
8051 microcontrollersnehapvs
 
Design development-and-implementation-of-a temperature-sensor-using-zigbee-co...
Design development-and-implementation-of-a temperature-sensor-using-zigbee-co...Design development-and-implementation-of-a temperature-sensor-using-zigbee-co...
Design development-and-implementation-of-a temperature-sensor-using-zigbee-co...Cemal Ardil
 
Computer engineering - overview of microprocessors
Computer engineering - overview of microprocessorsComputer engineering - overview of microprocessors
Computer engineering - overview of microprocessorsEkeedaPvtLtd
 
Empirically Derived Abstractions in Uncore Power Modeling for a Server-Class...
Empirically Derived Abstractions in Uncore Power Modeling for a  Server-Class...Empirically Derived Abstractions in Uncore Power Modeling for a  Server-Class...
Empirically Derived Abstractions in Uncore Power Modeling for a Server-Class...Arun Joseph
 
A Simplied Bit-Line Technique for Memory Optimization
A Simplied Bit-Line Technique for Memory OptimizationA Simplied Bit-Line Technique for Memory Optimization
A Simplied Bit-Line Technique for Memory Optimizationijsrd.com
 

Similar to A Seminar Presentation on Compiler Techniques for Energy Reduction in High-Performance Microprocessors (20)

DESIGNED DYNAMIC SEGMENTED LRU AND MODIFIED MOESI PROTOCOL FOR RING CONNECTED...
DESIGNED DYNAMIC SEGMENTED LRU AND MODIFIED MOESI PROTOCOL FOR RING CONNECTED...DESIGNED DYNAMIC SEGMENTED LRU AND MODIFIED MOESI PROTOCOL FOR RING CONNECTED...
DESIGNED DYNAMIC SEGMENTED LRU AND MODIFIED MOESI PROTOCOL FOR RING CONNECTED...
 
Cache
CacheCache
Cache
 
On chip cache
On chip cacheOn chip cache
On chip cache
 
DESIGN AND ANALYSIS OF A 32-BIT PIPELINED MIPS RISC PROCESSOR
DESIGN AND ANALYSIS OF A 32-BIT PIPELINED MIPS RISC PROCESSORDESIGN AND ANALYSIS OF A 32-BIT PIPELINED MIPS RISC PROCESSOR
DESIGN AND ANALYSIS OF A 32-BIT PIPELINED MIPS RISC PROCESSOR
 
DESIGN AND ANALYSIS OF A 32-BIT PIPELINED MIPS RISC PROCESSOR
DESIGN AND ANALYSIS OF A 32-BIT PIPELINED MIPS RISC PROCESSORDESIGN AND ANALYSIS OF A 32-BIT PIPELINED MIPS RISC PROCESSOR
DESIGN AND ANALYSIS OF A 32-BIT PIPELINED MIPS RISC PROCESSOR
 
Design and Analysis of A 32-bit Pipelined MIPS Risc Processor
Design and Analysis of A 32-bit Pipelined MIPS Risc ProcessorDesign and Analysis of A 32-bit Pipelined MIPS Risc Processor
Design and Analysis of A 32-bit Pipelined MIPS Risc Processor
 
Introduction to Microcontrollers
Introduction to MicrocontrollersIntroduction to Microcontrollers
Introduction to Microcontrollers
 
Bca examination 2015 csa
Bca examination 2015 csaBca examination 2015 csa
Bca examination 2015 csa
 
Interplay of Communication and Computation Energy Consumption for Low Power S...
Interplay of Communication and Computation Energy Consumption for Low Power S...Interplay of Communication and Computation Energy Consumption for Low Power S...
Interplay of Communication and Computation Energy Consumption for Low Power S...
 
Micro controller and dsp processor
Micro controller and dsp processorMicro controller and dsp processor
Micro controller and dsp processor
 
Low Power System on chip based design methodology
Low Power System on chip based design methodologyLow Power System on chip based design methodology
Low Power System on chip based design methodology
 
CA UNIT I PPT.ppt
CA UNIT I PPT.pptCA UNIT I PPT.ppt
CA UNIT I PPT.ppt
 
Data cache design itanium 2
Data cache design itanium 2Data cache design itanium 2
Data cache design itanium 2
 
Chapter 4 Microprocessor CPU
Chapter 4 Microprocessor CPUChapter 4 Microprocessor CPU
Chapter 4 Microprocessor CPU
 
Mod3
Mod3Mod3
Mod3
 
8051 microcontroller
8051 microcontroller8051 microcontroller
8051 microcontroller
 
Design development-and-implementation-of-a temperature-sensor-using-zigbee-co...
Design development-and-implementation-of-a temperature-sensor-using-zigbee-co...Design development-and-implementation-of-a temperature-sensor-using-zigbee-co...
Design development-and-implementation-of-a temperature-sensor-using-zigbee-co...
 
Computer engineering - overview of microprocessors
Computer engineering - overview of microprocessorsComputer engineering - overview of microprocessors
Computer engineering - overview of microprocessors
 
Empirically Derived Abstractions in Uncore Power Modeling for a Server-Class...
Empirically Derived Abstractions in Uncore Power Modeling for a  Server-Class...Empirically Derived Abstractions in Uncore Power Modeling for a  Server-Class...
Empirically Derived Abstractions in Uncore Power Modeling for a Server-Class...
 
A Simplied Bit-Line Technique for Memory Optimization
A Simplied Bit-Line Technique for Memory OptimizationA Simplied Bit-Line Technique for Memory Optimization
A Simplied Bit-Line Technique for Memory Optimization
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

A Seminar Presentation on Compiler Techniques for Energy Reduction in High-Performance Microprocessors

  • 1. Presented by Miss. Neha D. Jaiswal Co-guided by Guided by Prof. S.A. Fanan Prof.P.M.Pandit lJAWAHARLAL DARDA INSTITUTE OF ENGINEERING & TECHNOLOGY, YAVATMAL DEPARTMENT OF ELECTRONICS & TELECOMMUNICATION ENGINEERING
  • 2. Contents 1. History 2. What is Power? 3. Compiler? 4. What is Cache Memory? 5. Introduction of microprocessor 6. Compiler Enhancement 7. How compiling done? 8. Hardware Enhancement 9. Energy Estimation 10. Conclusion 11. References
  • 3. History  In 1970, at Carnegie Mellon University, William. A. Wulf developed optimizing compiler.  He was founder and vice president of Tartan Laboratories, a compiler technology company, in 1981.
  • 4. What is Power?  Power is the rate of doing work. It is the amount of energy consumed per unit time. In formal terms, P = W/T……..(1) E = P ∗ T…….(2) where, P is power, E is energy, T is a specific time interval, W is the total work performed in that interval. • Power is measured in watts. • For microprocessor, Power is the rate at which the computer consumes electrical energy or dissipates it in the form of heat.
  • 5. Compiler  A compiler is a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses.  When executing the statements, the compiler first analyzes all of the language statements one after the other and then ,builds the output code.  The output of the compilation has been called object code. Fig. Process of compiling
  • 6. What is Cache Memory?  Cache memory is a small-sized type of volatile computer memory.  Cache provide high-speed data access to a processor.  It stores frequently used computer programs, applications and data.
  • 7. Introduction about Microprocessor  Modern microprocessor are large power consumer- • Ultra SPARK-II consumes 58W maximum power at 296MHz. • Pentium Pro consumes 35W at 280MHz. • Alpha 21164 PC consumes 32.5W at 433MHz.  In microprocessor I-Cache subsystem which is one of the main power consumers. Fig:- I-cache
  • 8.  For that an additional minicache i.e L-cache is used between the I- Cache and the central processing unit (CPU) core and buffers instructions that are nested within loops.  In compiler technique for energy reduction code modifcations take place, through the compiler, that greatly simplify the required hardware, eliminate unnecessary instruction fetching, and consequently reduce signal switching activity and the dissipated energy.  The basic blocks are used a L-cache for proper distribution of instruction according to their priority. CPU L-cache Main memory
  • 9. How compiling done?  The control flow graph is built for describing each function of the original program.  The block placement algorithm is shown in Fig.  The input code & profile data is as a input Profile data Input code Nesting comput. For each BB LableTree construction BB selection and placements Global placement Branch insertion
  • 10. • The following sections give a detailed description for each block: 1.First Step: Nesting Computation:  The tool finds the loops and the nesting for every basic block.  Figure describe the data structure used & information produce.  Loop nesting shown in fig. along with CFG & labelsets.  Basic blocks within a loop which has a function call will not be eligible for caching. Fig. First step of block placement.
  • 11. 2. Second Step: LabelTree Construction  The LabelTree describes the nesting relationship between basic blocks. Fig. LableTree.
  • 12. 3.Third Step: Basic Block Selection and Placement • In this compiler know the how many maximum basic block can place in a cache. • In this step algorithm is done which scans the basic blocks in descending order of execution frequency. • The most important blocks are the first to be considered and have a greater chance to be placed in the L-Cache.
  • 13. 4.Fourth and Fifth Steps: Global Placement in the Memory • In this placing basic blocks in the global address space. • The algorithm takes as input the placement of the basic blocks with respect to the L-Cache and tries to minimize the necessary space as much as possible. Fig. Placing blocks in cache
  • 14. Hardware Enhancement • To implement of L-cache scheme require hardware. This is shown in fig. • L-cache tag will only output if the blocked part signal is on. This signal is generated by the instruction fetch unit (IFU). • In that case, the comparator checks for a match, and if it finds one, it instructs the multiplexer to drive the contents of the L-Cache in the data path. Fig. L-cache organisation
  • 15. • At the same time, the data portion of the L-Cache asserts its output and sends the new instruction to the data path. The I- Cache is disabled for the clock cycle, since the signal blocked part is on. • If blocked part off, the I-Cache controller activates the I-Cache without waiting for the L-Cache Hit signal. In this way, the L- Cache can be bypassed without a delay penalty.
  • 16. Energy Estimation  In this modeluses run-time information of the cache utilization i.e number of accesses, input statistics, etc.  A 0.8- µm technology with 3.3-V voltage supply is assumed.  These models are used for the estimation of energy in both the I-Cache and the L-Cache.
  • 17.  By using of power-consuming modules of a CPU, the Cache result in energy reduction.  Reduce total energy consumption of microprocessor.  Major energy gains can be obtained if the compiler and the hardware are designed with low energy.
  • 18. References [1] J. Edmondon, “Internal organization of the Alpha 21164, a 300 MHz 64-bit quad- issue CMOS RISC microprocessor,” Digital Tech. J., vol.7, no. 1, pp. 119–135, 1995. [2] D. Dobberpuhl, “The design of a high-performance low-power microprocessor,” in Proc. Int. Symp. Low Power Electronics and Design, 1996,pp. 11–16. [3] S. Manne, D. Grunwald, and A. Klauser, “Pipeline gating: Speculation control for energy reduction,” in Proc. Int. Symp. Computer Architecture, 1998, pp. 132–141. [4] V. Tiwari, S. Malik, and A. Wolfe, “Power analysis of embedded soft- ware: A first step toward software power minimization,” IEEE Trans. VLSI Syst., vol. 2, pp. 437–445, Dec. 1994. [5] V. Tiwari, S. Malik, A. Wolfe, and T. C. Lee, “Instruction level power analysis and optimization of software,” J. VLSI Signal Processing, vol. 13, Aug. 1996.