Anda di halaman 1dari 16

Advancements in Computer

architecture and
organization
Great driving Ideas for computer architecture
- Effect of Moore’s Law
- Abstraction to simplify design
- Optimize the common case
- Performance via parallelism
- Performance via pipelining
- Performance via prediction
- Memory hierarchy
- Redundancy to ensure dependency
Computer architecture is foundation of upcoming IT
industry.
- Key trends to set turning point in computer architecture
- Technology drivers
- Scaling at transistor level not possible any more
- emerging new technologies for logic devices, storage, and
interconnects that can be game-changers in the future
- Application drivers
- rich multimedia applications, data-intensive computing,
mobile/embedded computing, and warehouse-scale data center
computing
- Metrics and goals
- Not only performance, secure, reliable and manageable hardbound
power budget
Execution
environments
- Flynn’s
Taxonomy
Memory access mechanism
- Symmetric Multiprocessing
- used normally to increase computing power
- Asymmetric Multiprocessing
- used normally when different kind of processing power needed(DSP,
MCU, GPU);
- may have different OS on different cores
- Massively parallel Processing (MPP)
- used in distributed computing environment;
- uses some message passing mechanisms for sharing
Edge between hardware and software need to be
redefined
- New instruction set architecture to handle logical and implementation ISA
- Logical ISA may be bytecode like higher level languages for specific
application domain
- implementation ISA might be unconstrained by compatibility requirement and
hardware dependent

Application code first get converted to logical ISA by re-targetable static compiler

This logical ISA get dynamically translated and optimized into Implementation ISA
by re-targetable dynamic compiler
Architecture that plays beyond power and
performance
- Hardware level encryption module to detect and run secure softwares
- Secure and trusted execution environment
- Secure execution by embedding security in hardware buses
- By Virtualization technology isolating two worlds of application in secure and
non secure mode
- Security by software encryption
- Security embedded in OS/RTOS

ARM TrustZone, Intel AES NI, Intel Virtualization Technology, hardware assisted
security etc have given good path way to secure Computing systems
Organization of Resource

Operating system plays important role

- Process management
- Memory management
- Scheduling
- Networking
- I/O management
- File system
Advancements in Organization

- RTOS
- Virtualization technology
- Hardware based or OS based virtualization
- Software virtualization
- Network virtualization
- Server virtualization
- Power virtualization
- Dockerization and containers
- High performance computing
- SIMD, MIMD and MISD
- Inter Processor communication
- CUDA, openMP, openMPI etc...
Virtualization Technology

- Supervisor of supervisor
- Hardware level virtualization
- Memory management and CPU management
Dockerization
Virtualization vs Docker
Example of parallel processing using openMP
- Multi threaded shared memory parallelism
- Preprocessing directives for c and fortran;easy to make parallel
- Support for UMA and NUMA
- Dynamic threads by environment variables
- Consist of
- Compiler Directives
- Runtime Library Routines
- Environment Variables
Thank you
You can contact me:
Shreeji Shah
Technical Associate: Embedded Software and Device Drivers
eiTRA
Email ID: shreeji.sheth@eitra.org
Contact Number: 9428409162

Anda mungkin juga menyukai