4.non Linear Pipeline

  • Uploaded by: dev chauhan
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View 4.non Linear Pipeline as PDF for free.

More details

  • Words: 786
  • Pages: 20
Non Linear Pipeline

Nonlinear Pipeline   



Dynamic Multifunction Allows feed back and feed forward connections, in addition to the streamline connections. More than one output; the output of the pipeline is not necessarily from the last stage.

Reservation Table 

Shows the path of the dataflow through the pipeline  Linear

pipeline will follow a streamline flow  Non linear pipeline will follow a non linear pattern

Reservation table for a Linear pipeline 1 S1 S2 S3 S4

2

3

4

X X X X

Considering a Multifunction Pipeline

OUTPUT X

S1

3 Stage Pipeline

S2

S3

OUTPUT Y

2 Streamline Connections 2 Feedback Connections 1 Feedforward Connection

Reservation Table for function X 1 S1 S2 S3

2

3

4

5

X

6

7

X X

8

X

X X

X

X

• Columns represent the evaluation time for a given function

• Multiple checkmarks in a row, means repeated usage of the same stage in different cycles

Reservation Table for function Y 1 S1

2

4

Y

5

6

Y Y

S2 S3

3

Y

Y

Y

Latency Analysis 







Latency: The number of time units (clock cycles) between two initiations of a pipeline is the latency between them. A latency value k means that two initiations are separated by k clock cycles. Any attempt by two or more initiations to use the same pipeline stage at the same time will cause a collision. A collision implies resource conflicts between two initiations in a pipeline.

Collision with scheduling latency 2 1 S1

S2

2

x1

3

x2 x1

5

6

7

x3

x1

x4

x1 x2 x1

S3

4

x2 x3 x1 x2

x1 x2 x3

8

9

10

x1 x2

x2 x3

x3 x4

x4 x2 x3 x4



 

Latencies that cause collision are called forbidden latencies. Forbidden latencies for function X are 2,4,5,7 Latencies 1,3,6 do not cause collision.

    

Maximum forbidden latency can be m n = no. of columns m ≤ n-1 All the latencies greater than m+ do not cause collisions. Permissible Latency p, lies in the range: 1

≤ p ≤ m-1  Value of p should be as small as possible  Permissible latency p=1 corresponds to an ideal case, can be achieved by a static pipeline

Collision Vectors 



Combined set of permissible and forbidden latencies. m-bit binary vector C = (Cm Cm-1….C2 C1 )



The value of Ci = 1 if the latency i causes a collision; Ci = 0 if the latency i is permissible.



Cm = 1, always; it corresponds to the maximum forbidden latency.

State Diagrams 



State diagrams can be constructed to specify the permissible transitions among successive initiations. The collision vector, corresponding to the initial state of pipeline at time 1, is called the initial collision vector.



 

The next state of the pipeline at time t+p can be obtained by using a bit-right shift register Initial CV is loaded into the register. The register is then shifted to the right  

 



When a 0 emerges from the right end after p shifts, p is a permissible latency When a 1 emerges, the corresponding latency should be forbidden

Logical 0 enters from the left end of the shift register. The next state after p shifts is obtained by bitwise-ORing the initial CV with the shifted register contents. This bitwise-ORing of the shifted contents is meant to prevent collisions from the future initiations starting at time t+1 and onward.



Latency Cycles



Simple Cycles : Latency cycle in which each state appears only once.



Greedy Cycles : whose edges are all made with minimum latencies from their respective starting states.



MAL : minimum average latency  At

least one of the greedy cycles will lead to MAL

Collision-free scheduling  

Finding Greedy cycles from the set of Simple cycles The Greedy cycle yielding the MAL is the final choice

Optimization technique 

Insertion of Delay stages  Modification

of reservation table

 New

CV  Improved state diagram 

To yield an optimal latency cycle

Bounds on MAL 





MAL is lower-bounded by the maximum number of checkmarks in any row of the reservation table. MAL is lower than or equal to the average latency of any greedy cycle in the state diagram. Average latency of any greedy cycle is upperbounded by the number of 1’s in the initial CV plus 1.



Optimal latency cycle is selected from one of the lowest greedy cycles.

Output

Input

S1

1 S1 S2 S3

S2

2

3

S3

4

X

5

X X

X X

X

Related Documents

4.non Linear Pipeline
May 2020 12
Pipeline
May 2020 70
Ch6 Pipeline
June 2020 47
Pipeline Design
June 2020 43
Pipeline Design
June 2020 45
03 Pipeline
July 2020 45

More Documents from "kentofisto"

1.parallel Processing
May 2020 12
3.array Processors
May 2020 12
Parallel Processing:
May 2020 21
4.non Linear Pipeline
May 2020 12
Earthquake.docx
December 2019 49
Equity Large Cap.docx
November 2019 55