SlideShare a Scribd company logo
COMPUTER ORGANISATION
THE INSTRUCTIONS AND CACHE
OF PENTIUM MICROPROCESSOR
ANUSH HP
OVERVIEW
 PENTIUM INSTRUCTION FORMAT
 INSTRUCTION LENGTH
 INSTRUCTION SET EXTENSIONS
 P III INSTRUCTION EXECUTION UNITS
 PENTIUM 4 INSTRUCTION SET
 PENTIUM IV PROCESSOR ARCHITECTURE
 CACHE STRUCTURE
 BLOCK DIAGRAM of CACHE STRUCTURE
 CACHE ORGANIZATION
 CPU & CACHE HANDLING
PENTIUM INSTRUCTION FORMAT
 Supports 8, 16, 32-bit operands.
 It defined layout of bit in an
instruction which includes Opcodes.
 Officially 17 addressing modes,
arguably more.
 Keyed off the opcode and prefixes
 Identical “assembly language” from
old 8080 CPU.
 It has more than one instruction
format in an instruction set.
INSTRUCTION LENGTH
It is affected and also affects the system in
Memory Size
Memory Organization
Bus structure
Opcodes and Operands
CPU Complexity
CPU speed
INSTRUCTION SET EXTENSIONS
 Each new processor brought new instructions
• Specialized sets, too
 80x87 Math Co-Processor
• Introduced floating point instructions and stack
• Integrated into later processors
 MMX (1997)
• SIMD instructions, 8 integer registers @ 64 bits (reused FP)
 3DNow! (AMD in 1997)
• MMX extended to support floating point operations
 SSE (1999; SSE2 in 2000 for integers)
• 8 giant 128-bit registers for SIMD operation
P III INSTRUCTION EXECUTION UNITS
PENTIUM 4 INSTRUCTION SET
Embeds a RISC architecture and pipelining within a CISC instruction set
• Instructions fetched to CPU
• Translated into internal RISC-style “microinstructions”
• Microinstructions are stored in the level 0 instruction cache
• CPU execution logic executes microinstructions in a pipelined fashion.
Retains compatibility with old Pentium and x86 code while achieving
RISC-like performance.
PENTIUM IV PROCESSOR ARCHITECTURE
CACHE STRUCTURE
Cache structure gives info in-depth regarding the cache of the original Pentium
processor.
 It include cache organization, operation modes, and methods to ensuring cache
consistency.
Cache is located on-chip and is divided into separate pieces; one for data and
one for code, each at 8KB.
This division is done to maximize both flexibility and performance by allowing
both code and data caches to readily cross page boundaries without having to
overwrite one another.
BLOCK DIAGRAM OF CACHE STRUCTURE
CACHE ORGANIZATION
In a set-associative structure the cache is divided into equal sections called
cache ways.
 The cache page size is equal to the size of the cache way and each cache way
is treated like a small direct mapped cache.
 In a 2-way scheme, two lines of memory may be stored at any time.
The Pentium processor’s cache line size is 32 bytes and is filled by a burst of
four reads on the processor’s 64-bit data bus.
 Each cache way contains 128 cache lines and the cache page size is 4K, or
128 lines.
CPU AND CACHE HANDLING
 Activities that occurs when there is a cache miss
• A stall, like a pipeline stall, but simpler.
• We stall the whole CPU - inefficient but it’s the best approach.
 When user writes a data
• “Write through” runs the write while CPU proceeds
• Other CPU accesses get the cached, updated value
• “Write miss” - obvious approach isn’t efficient
• Use a “write buffer” to catch missed writes
QUESTIONS ???
THANK YOU

More Related Content

What's hot

Computer registers
Computer registersComputer registers
Computer registers
Jatin Grover
 
Storage system architecture
Storage system architectureStorage system architecture
Storage system architecture
Christalin Nelson
 
Pentium processor
Pentium processorPentium processor
Pentium processor
Pranjali Deshmukh
 
First fit , Best fit, Worst fit
First fit , Best fit, Worst fitFirst fit , Best fit, Worst fit
First fit , Best fit, Worst fit
Shahzeb Amjad
 
Combined paging and segmentation
Combined paging and segmentationCombined paging and segmentation
Combined paging and segmentation
Tech_MX
 
Computer Organization Lecture Notes
Computer Organization Lecture NotesComputer Organization Lecture Notes
Computer Organization Lecture Notes
FellowBuddy.com
 
RAID LEVELS
RAID LEVELSRAID LEVELS
RAID LEVELS
Uzair Khan
 
Cache memory principles
Cache memory principlesCache memory principles
Cache memory principles
bit allahabad
 
Parallel processing Concepts
Parallel processing ConceptsParallel processing Concepts
Parallel processing Concepts
Army Public School and College -Faisal
 
Instruction Set Architecture – II
Instruction Set Architecture – IIInstruction Set Architecture – II
Instruction Set Architecture – II
Dilum Bandara
 
Computer organization
Computer organizationComputer organization
Computer organization
ishapadhy
 
Pentium microprocessor
Pentium microprocessorPentium microprocessor
Pentium microprocessor
tanzidshawon
 
pipelining
pipeliningpipelining
pipelining
Siddique Ibrahim
 
Computer architecture pipelining
Computer architecture pipeliningComputer architecture pipelining
Computer architecture pipelining
Mazin Alwaaly
 
Ui disk & terminal drivers
Ui disk & terminal driversUi disk & terminal drivers
Ui disk & terminal drivers
Sarang Ananda Rao
 
Chapter 3 INSTRUCTION SET AND ASSEMBLY LANGUAGE PROGRAMMING
Chapter 3 INSTRUCTION SET AND ASSEMBLY LANGUAGE PROGRAMMINGChapter 3 INSTRUCTION SET AND ASSEMBLY LANGUAGE PROGRAMMING
Chapter 3 INSTRUCTION SET AND ASSEMBLY LANGUAGE PROGRAMMING
Frankie Jones
 
Lecture1 - Computer Architecture
Lecture1 - Computer ArchitectureLecture1 - Computer Architecture
Lecture1 - Computer Architecture
Volodymyr Ushenko
 
Inter process communication
Inter process communicationInter process communication
Inter process communication
RJ Mehul Gadhiya
 
File system structure
File system structureFile system structure
File system structure
sangrampatil81
 
Operating System Overview
Operating System OverviewOperating System Overview
Operating System Overview
Anas Ebrahim
 

What's hot (20)

Computer registers
Computer registersComputer registers
Computer registers
 
Storage system architecture
Storage system architectureStorage system architecture
Storage system architecture
 
Pentium processor
Pentium processorPentium processor
Pentium processor
 
First fit , Best fit, Worst fit
First fit , Best fit, Worst fitFirst fit , Best fit, Worst fit
First fit , Best fit, Worst fit
 
Combined paging and segmentation
Combined paging and segmentationCombined paging and segmentation
Combined paging and segmentation
 
Computer Organization Lecture Notes
Computer Organization Lecture NotesComputer Organization Lecture Notes
Computer Organization Lecture Notes
 
RAID LEVELS
RAID LEVELSRAID LEVELS
RAID LEVELS
 
Cache memory principles
Cache memory principlesCache memory principles
Cache memory principles
 
Parallel processing Concepts
Parallel processing ConceptsParallel processing Concepts
Parallel processing Concepts
 
Instruction Set Architecture – II
Instruction Set Architecture – IIInstruction Set Architecture – II
Instruction Set Architecture – II
 
Computer organization
Computer organizationComputer organization
Computer organization
 
Pentium microprocessor
Pentium microprocessorPentium microprocessor
Pentium microprocessor
 
pipelining
pipeliningpipelining
pipelining
 
Computer architecture pipelining
Computer architecture pipeliningComputer architecture pipelining
Computer architecture pipelining
 
Ui disk & terminal drivers
Ui disk & terminal driversUi disk & terminal drivers
Ui disk & terminal drivers
 
Chapter 3 INSTRUCTION SET AND ASSEMBLY LANGUAGE PROGRAMMING
Chapter 3 INSTRUCTION SET AND ASSEMBLY LANGUAGE PROGRAMMINGChapter 3 INSTRUCTION SET AND ASSEMBLY LANGUAGE PROGRAMMING
Chapter 3 INSTRUCTION SET AND ASSEMBLY LANGUAGE PROGRAMMING
 
Lecture1 - Computer Architecture
Lecture1 - Computer ArchitectureLecture1 - Computer Architecture
Lecture1 - Computer Architecture
 
Inter process communication
Inter process communicationInter process communication
Inter process communication
 
File system structure
File system structureFile system structure
File system structure
 
Operating System Overview
Operating System OverviewOperating System Overview
Operating System Overview
 

Viewers also liked

PD PPT
PD PPTPD PPT
Unit 2 arithmetics
Unit 2   arithmeticsUnit 2   arithmetics
Unit 2 arithmetics
chidabdu
 
Business Information System on Zomato base
Business Information System on Zomato baseBusiness Information System on Zomato base
Business Information System on Zomato base
Alok Nanda
 
Zomato UX redesign project
Zomato UX redesign projectZomato UX redesign project
Zomato UX redesign project
Harshita Sajjanhar
 
Zomato Case Study-DM
Zomato Case Study-DMZomato Case Study-DM
Zomato Case Study-DM
Sahil Khanna
 
Zomato
Zomato Zomato
Zomato
chintan_bhuva
 
Physical evidence in services
Physical evidence in servicesPhysical evidence in services
Physical evidence in services
Prashant Sakariya
 
Services Marketing
Services MarketingServices Marketing
Services Marketing
Ch Usman Waheed
 
Can We Assess Creativity?
Can We Assess Creativity?Can We Assess Creativity?
Can We Assess Creativity?
John Spencer
 

Viewers also liked (9)

PD PPT
PD PPTPD PPT
PD PPT
 
Unit 2 arithmetics
Unit 2   arithmeticsUnit 2   arithmetics
Unit 2 arithmetics
 
Business Information System on Zomato base
Business Information System on Zomato baseBusiness Information System on Zomato base
Business Information System on Zomato base
 
Zomato UX redesign project
Zomato UX redesign projectZomato UX redesign project
Zomato UX redesign project
 
Zomato Case Study-DM
Zomato Case Study-DMZomato Case Study-DM
Zomato Case Study-DM
 
Zomato
Zomato Zomato
Zomato
 
Physical evidence in services
Physical evidence in servicesPhysical evidence in services
Physical evidence in services
 
Services Marketing
Services MarketingServices Marketing
Services Marketing
 
Can We Assess Creativity?
Can We Assess Creativity?Can We Assess Creativity?
Can We Assess Creativity?
 

Similar to Pentium 8086 Instruction Format

Pentium
PentiumPentium
Pentium
PentiumPentium
cache memory
 cache memory cache memory
cache memory
NAHID HASAN
 
Mips 64
Mips 64Mips 64
Memory Mapping Cache
Memory Mapping CacheMemory Mapping Cache
Memory Mapping Cache
Sajith Harshana
 
UNIT 2.pptx
UNIT 2.pptxUNIT 2.pptx
UNIT 2.pptx
BLACKSPAROW
 
Cache memory
Cache memoryCache memory
Cache memory
Eklavya Gupta
 
Microprocessor
MicroprocessorMicroprocessor
Microprocessor
CharltonInao1
 
It322 intro 2
It322 intro 2It322 intro 2
It322 intro 2
J Cza Àkera
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Computer Hardware & Software Lab Manual 3
Computer Hardware & Software Lab Manual 3Computer Hardware & Software Lab Manual 3
Computer Hardware & Software Lab Manual 3
senayteklay
 
9781111306366 ppt ch3
9781111306366 ppt ch39781111306366 ppt ch3
9781111306366 ppt ch3
Dr. Ahmed Al Zaidy
 
Mpmc
MpmcMpmc
4.1 Introduction 145• In this section, we first take a gander at a.pdf
4.1 Introduction 145• In this section, we first take a gander at a.pdf4.1 Introduction 145• In this section, we first take a gander at a.pdf
4.1 Introduction 145• In this section, we first take a gander at a.pdf
arpowersarps
 
Cache performance-x86-2009
Cache performance-x86-2009Cache performance-x86-2009
Cache performance-x86-2009
Léia de Sousa
 
Chap2 5e u v2 - theory
Chap2 5e u v2 - theoryChap2 5e u v2 - theory
Chap2 5e u v2 - theory
dd25251
 
02 the cpu
02 the cpu02 the cpu
02 the cpu
Jim Finn
 
Intel 8th generation and 7th gen microprocessor full details especially for t...
Intel 8th generation and 7th gen microprocessor full details especially for t...Intel 8th generation and 7th gen microprocessor full details especially for t...
Intel 8th generation and 7th gen microprocessor full details especially for t...
Chessin Chacko
 
Processoer 80486
Processoer 80486Processoer 80486
PENTIUM - PRO MICROPROCESSORS MP SY.pptx
PENTIUM - PRO MICROPROCESSORS MP SY.pptxPENTIUM - PRO MICROPROCESSORS MP SY.pptx
PENTIUM - PRO MICROPROCESSORS MP SY.pptx
SanjayBhosale20
 

Similar to Pentium 8086 Instruction Format (20)

Pentium
PentiumPentium
Pentium
 
Pentium
PentiumPentium
Pentium
 
cache memory
 cache memory cache memory
cache memory
 
Mips 64
Mips 64Mips 64
Mips 64
 
Memory Mapping Cache
Memory Mapping CacheMemory Mapping Cache
Memory Mapping Cache
 
UNIT 2.pptx
UNIT 2.pptxUNIT 2.pptx
UNIT 2.pptx
 
Cache memory
Cache memoryCache memory
Cache memory
 
Microprocessor
MicroprocessorMicroprocessor
Microprocessor
 
It322 intro 2
It322 intro 2It322 intro 2
It322 intro 2
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Computer Hardware & Software Lab Manual 3
Computer Hardware & Software Lab Manual 3Computer Hardware & Software Lab Manual 3
Computer Hardware & Software Lab Manual 3
 
9781111306366 ppt ch3
9781111306366 ppt ch39781111306366 ppt ch3
9781111306366 ppt ch3
 
Mpmc
MpmcMpmc
Mpmc
 
4.1 Introduction 145• In this section, we first take a gander at a.pdf
4.1 Introduction 145• In this section, we first take a gander at a.pdf4.1 Introduction 145• In this section, we first take a gander at a.pdf
4.1 Introduction 145• In this section, we first take a gander at a.pdf
 
Cache performance-x86-2009
Cache performance-x86-2009Cache performance-x86-2009
Cache performance-x86-2009
 
Chap2 5e u v2 - theory
Chap2 5e u v2 - theoryChap2 5e u v2 - theory
Chap2 5e u v2 - theory
 
02 the cpu
02 the cpu02 the cpu
02 the cpu
 
Intel 8th generation and 7th gen microprocessor full details especially for t...
Intel 8th generation and 7th gen microprocessor full details especially for t...Intel 8th generation and 7th gen microprocessor full details especially for t...
Intel 8th generation and 7th gen microprocessor full details especially for t...
 
Processoer 80486
Processoer 80486Processoer 80486
Processoer 80486
 
PENTIUM - PRO MICROPROCESSORS MP SY.pptx
PENTIUM - PRO MICROPROCESSORS MP SY.pptxPENTIUM - PRO MICROPROCESSORS MP SY.pptx
PENTIUM - PRO MICROPROCESSORS MP SY.pptx
 

Recently uploaded

CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 

Recently uploaded (20)

CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 

Pentium 8086 Instruction Format

  • 1. COMPUTER ORGANISATION THE INSTRUCTIONS AND CACHE OF PENTIUM MICROPROCESSOR ANUSH HP
  • 2. OVERVIEW  PENTIUM INSTRUCTION FORMAT  INSTRUCTION LENGTH  INSTRUCTION SET EXTENSIONS  P III INSTRUCTION EXECUTION UNITS  PENTIUM 4 INSTRUCTION SET  PENTIUM IV PROCESSOR ARCHITECTURE  CACHE STRUCTURE  BLOCK DIAGRAM of CACHE STRUCTURE  CACHE ORGANIZATION  CPU & CACHE HANDLING
  • 3. PENTIUM INSTRUCTION FORMAT  Supports 8, 16, 32-bit operands.  It defined layout of bit in an instruction which includes Opcodes.  Officially 17 addressing modes, arguably more.  Keyed off the opcode and prefixes  Identical “assembly language” from old 8080 CPU.  It has more than one instruction format in an instruction set.
  • 4. INSTRUCTION LENGTH It is affected and also affects the system in Memory Size Memory Organization Bus structure Opcodes and Operands CPU Complexity CPU speed
  • 5. INSTRUCTION SET EXTENSIONS  Each new processor brought new instructions • Specialized sets, too  80x87 Math Co-Processor • Introduced floating point instructions and stack • Integrated into later processors  MMX (1997) • SIMD instructions, 8 integer registers @ 64 bits (reused FP)  3DNow! (AMD in 1997) • MMX extended to support floating point operations  SSE (1999; SSE2 in 2000 for integers) • 8 giant 128-bit registers for SIMD operation
  • 6. P III INSTRUCTION EXECUTION UNITS
  • 7. PENTIUM 4 INSTRUCTION SET Embeds a RISC architecture and pipelining within a CISC instruction set • Instructions fetched to CPU • Translated into internal RISC-style “microinstructions” • Microinstructions are stored in the level 0 instruction cache • CPU execution logic executes microinstructions in a pipelined fashion. Retains compatibility with old Pentium and x86 code while achieving RISC-like performance.
  • 8. PENTIUM IV PROCESSOR ARCHITECTURE
  • 9. CACHE STRUCTURE Cache structure gives info in-depth regarding the cache of the original Pentium processor.  It include cache organization, operation modes, and methods to ensuring cache consistency. Cache is located on-chip and is divided into separate pieces; one for data and one for code, each at 8KB. This division is done to maximize both flexibility and performance by allowing both code and data caches to readily cross page boundaries without having to overwrite one another.
  • 10. BLOCK DIAGRAM OF CACHE STRUCTURE
  • 11. CACHE ORGANIZATION In a set-associative structure the cache is divided into equal sections called cache ways.  The cache page size is equal to the size of the cache way and each cache way is treated like a small direct mapped cache.  In a 2-way scheme, two lines of memory may be stored at any time. The Pentium processor’s cache line size is 32 bytes and is filled by a burst of four reads on the processor’s 64-bit data bus.  Each cache way contains 128 cache lines and the cache page size is 4K, or 128 lines.
  • 12. CPU AND CACHE HANDLING  Activities that occurs when there is a cache miss • A stall, like a pipeline stall, but simpler. • We stall the whole CPU - inefficient but it’s the best approach.  When user writes a data • “Write through” runs the write while CPU proceeds • Other CPU accesses get the cached, updated value • “Write miss” - obvious approach isn’t efficient • Use a “write buffer” to catch missed writes