Show simple item record

Technology-organization tradeoffs in the architecture of a high-performance processor.

dc.contributor.authorOlukotun, Oyekunle Ayinde
dc.contributor.advisorMudge, Trevor N.
dc.date.accessioned2016-08-30T16:56:32Z
dc.date.available2016-08-30T16:56:32Z
dc.date.issued1991
dc.identifier.urihttp://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:9208618
dc.identifier.urihttps://hdl.handle.net/2027.42/128829
dc.description.abstractTo design computers which reach the performance limits of the implementation technology, one must understand the relationships between the technology and organization of the processor. This thesis presents a multilevel performance optimization methodology to analyze these relationships. All technology-organization relationships can be analyzed as tradeoffs between CPU cycle time ($t\sb{\rm CPU}$) and CPU cycles per instruction (CPI), the product of which, time per instruction (TPI), is used as the performance metric in this thesis. Two new analysis tools: (1) a timing analyzer for $t\sb{\rm CPU}$ and (2) a trace-driven cache simulator for CPI are an integral part of the optimization methodology. The methodology is extensively validated using a high performance processor design that is implemented out of gallium arsenide chips and multichip module packaging. The results of this validation are a number of general guidelines for high performance processor design. The methodology is first applied to the design of the first-level cache of a two-level cache hierarchy. Simple expressions are derived that provide the access time of on-chip and MCM based caches of various sizes. The access time of the first-level cache is on the critical path of the processor and so determines $t\sb{\rm CPU}$. When the first-level cache is unpiplined maximum performance is reached with small caches that have short access times. When the first-level cache is pipelined higher maximum performance is reached with larger caches that have longer access times. This is possible because the increase in CPI, that pipelining has the potential to create, can be effectively hidden by using static scheduling techniques. Applying the methodology to other parts of the cache-hierarchy produces the following results. Second-level caches that are split between instructions and data have performance and implementation benefits. The choice of write-policy (write-back or write-through) depends on the effective access time of the next higher level of the memory hierarchy. Adding concurrency to the cache-hierarchy in the form of write-buffering of the second-level cache or a non-blocking first-level cache provides modes reductions in CPI. When the reduction in CPI is weighed against the increased implementation complexity and possible increase in $t\sb{\rm CPU}$ these techniques for improving performance are not nearly as effective as increasing the sizes of the caches and pipelining the first-level cache.
dc.format.extent173 p.
dc.languageEnglish
dc.language.isoEN
dc.subjectArchitecture
dc.subjectHigh
dc.subjectMicroprocessor
dc.subjectOrganization
dc.subjectPerformance
dc.subjectProcess
dc.subjectProcessor
dc.subjectTechnology
dc.subjectTradeoffs
dc.titleTechnology-organization tradeoffs in the architecture of a high-performance processor.
dc.typeThesis
dc.description.thesisdegreenamePhDen_US
dc.description.thesisdegreedisciplineApplied Sciences
dc.description.thesisdegreedisciplineComputer science
dc.description.thesisdegreedisciplineElectrical engineering
dc.description.thesisdegreegrantorUniversity of Michigan, Horace H. Rackham School of Graduate Studies
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/128829/2/9208618.pdf
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.