By John L. Hennessy

"Once in an exceptional whereas, a landmark computer-science e-book is released. desktop structure: A Quantitative strategy, moment version, is this sort of booklet. In an period of fluff machine books which are, fairly appropriately, remaindered inside of weeks of ebook, this ebook will stand the attempt of time, turning into lovingly dog-eared within the arms of someone who designs pcs or has matters in regards to the functionality of laptop programs." - Robert Bernecky, Dr. Dobb's magazine, April 1998Computer structure: A Quantitative strategy was once the 1st e-book to target computing device structure as a latest technological know-how. Its booklet in 1990 encouraged a brand new method of learning and knowing machine layout. Now, the second one variation explores the subsequent new release of architectures and layout ideas with view to the future.A foundation for contemporary machine architectureAs the authors clarify of their preface to the second one version, computing device structure itself has passed through major switch considering that 1990. focusing on at the moment major and rising advertisement platforms, the Hennessy and Patterson have ready completely new chapters overlaying extra complicated topics:* complex Pipelining: a brand new bankruptcy emphasizes superscalar and a number of issues.* Networks: a brand new bankruptcy examines extensive the layout matters for small and big shared-memory multiprocessors.* garage structures: accelerated presentation comprises insurance of I/O functionality measures.* reminiscence: improved insurance of caches and memory-hierarchy layout addresses modern layout issues.* Examples and workouts: thoroughly revised on present architectures resembling MIPS R4000, Intel 80x86 and Pentium, PowerPC, and HP PA-RISC.Distinctive presentationThis booklet maintains the fashion of the 1st version, with revised sections on Fallacies and Pitfalls, placing all of it jointly and old viewpoint, and comprises totally new sections on Crosscutting concerns. the point of interest on basic innovations for designing actual machines and the eye to maximizing cost/performance are an important to either scholars and dealing execs. a person fascinated by development pcs, from palmtops to supercomputers, will cash in on the services provided by means of Hennessy and Patterson.

Show description

Read Online or Download Computer Architecture: A Quantitative Approach, 2nd Edition, 1996 PDF

Similar systems analysis & design books

Models of computation: exploring the power of computing

In versions of Computation: Exploring the ability of Computing, John Savage re-examines theoretical computing device technology, supplying a clean method that provides precedence to source tradeoffs and complexity classifications over the constitution of machines and their relationships to languages. This standpoint displays a pedagogy stimulated through the starting to be significance of computational types which are extra sensible than the summary ones studied within the Fifties, '60s and early '70s.

GeoSensor Networks: Second International Conference, GSN 2006, Boston, MA, USA, October 1-3, 2006, Revised Selected and Invited Papers

This ebook constitutes the completely refereed lawsuits of the second one GeoSensor Networks convention, held in Boston, Massachusetts, united states, in October 2006. The convention addressed concerns regarding the gathering, administration, processing, research, and supply of real-time geospatial facts utilizing disbursed geosensor networks.

Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models

Verification and validation represents a massive strategy used for the standard review of engineered structures and their compliance with the necessities demonstrated before everything of or through the improvement cycle. Debbabi and his coauthors examine methodologies and strategies that may be hired for the automated verification and validation of structures engineering layout versions expressed in standardized modeling languages.

Measuring computer performance. A practitioner's guide

Measuring laptop functionality units out the elemental suggestions utilized in studying and figuring out the functionality of computers. in the course of the ebook, the emphasis is on useful tools of dimension, simulation, and analytical modeling. the writer discusses functionality metrics and gives designated assurance of the recommendations utilized in benchmark programmes.

Extra resources for Computer Architecture: A Quantitative Approach, 2nd Edition, 1996

Sample text

S. Army and became operational during World War II, but it was not publicly disclosed until 1946. ENIAC was used for computing artillery firing tables. The machine was enormous—100 feet long, 8 1/2 feet high, and several feet wide—far beyond the size of any computer built today. Each of the 20 10digit registers was 2 feet long. In total, there were 18,000 vacuum tubes. While the size was three orders of magnitude bigger than the size of machines built today, it was more than five orders of magnitude slower, with an add taking 200 microseconds.

A fixed-size block of data, called a block, containing the requested word is retrieved from the main memory and placed into the cache. Temporal locality tells us that we are likely to need this word again in the near future, so placing it in the cache where it can be accessed quickly is useful. Because of spatial locality, there is high probability that the other data in the block will be needed soon. The time required for the cache miss depends on both the latency of the memory and its bandwidth, which determines the time to retrieve the entire block.

Amdahl’s Law states that the performance improvement to be gained from using some faster mode of execution is limited by the fraction of the time the faster mode can be used. Amdahl’s Law defines the speedup that can be gained by using a particular feature. What is speedup? Suppose that we can make an enhancement to a machine that will improve performance when it is used. Speedup is the ratio Speedup = Performance for entire task using the enhancement when possible Performance for entire task without using the enhancement Alternatively, Speedup = Execution time for entire task without using the enhancement Execution time for entire task using the enhancement when possible 30 Chapter 1 Fundamentals of Computer Design Speedup tells us how much faster a task will run using the machine with the enhancement as opposed to the original machine.

Download PDF sample

Rated 4.85 of 5 – based on 46 votes