e2k - elbrus

Post on 08-Feb-2018

243 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

7/22/2019 E2K - Elbrus

http://slidepdf.com/reader/full/e2k-elbrus 1/9

The Elbrus 2000 (E2K)

ExpLicit Basic Resource Utilization

Scheduling (ELBRUS)

By: Andrew Chesney

7/22/2019 E2K - Elbrus

http://slidepdf.com/reader/full/e2k-elbrus 2/9

History

• Goal: A fast, reliable,compatible, andsecure computer

• Boris Babayan  • Elbrus-1 (1979)

• Elbrus-2 (1984)

• Elbrus-3 (1991)

• Elbrus-3M1 (2005) – This was the first computer basedon the Elbrus 2000 architecture.

• Monoblock KM-4 (2012)

7/22/2019 E2K - Elbrus

http://slidepdf.com/reader/full/e2k-elbrus 3/9

7/22/2019 E2K - Elbrus

http://slidepdf.com/reader/full/e2k-elbrus 4/9

Compatible

• Supports two ISA’s: • Elbrus VLIW

 – Computer doesn’t need to run at a high clock speed to

perform fast

•Intel x86

 – Transparency of binary compiled code

 – Binary translation system creates a virtual machine which runs

the guest OS for the x86 architecture

 – Runs almost exactly as it would on x86 computer

7/22/2019 E2K - Elbrus

http://slidepdf.com/reader/full/e2k-elbrus 5/9

Fast

• The compiler is able to analyze source code

more carefully than hardware RISC/CISC

processors.

 – This allows for more independent operations to be

found.

• Increases Instruction Level Parallelism

 –

Able to run more independent operations simultaneously

• Can execute up to 23 operations per clock.

7/22/2019 E2K - Elbrus

http://slidepdf.com/reader/full/e2k-elbrus 6/9

Reliability (HW)

• All units have extra HW for:

 – Detecting single hardware faults and reporting

them to the rest of the system

 – Disconnects all signal lines from faulty unit

• Basically impossible for the system to deliver a

wrong result without any signal of alarm

7/22/2019 E2K - Elbrus

http://slidepdf.com/reader/full/e2k-elbrus 7/9

Reliability (SW)

• “The wisdom is simple – data types (for securitypointers only) should be handled correctly” 

• Support for data and procedure pointers – All pointers marked by special bit

• Allows HW to check for proper pointer handling

• This strategy allows for: – Decreased debugging time

 – Decreased probability of missing an undetected bug inalready delivered software

 – Ensures perfect protection between separateprocedures in same virtual space

7/22/2019 E2K - Elbrus

http://slidepdf.com/reader/full/e2k-elbrus 8/9

Secure

• All data accessed through address information

• (references and pointers)

• If pointers are handled properly

 – System is secure

• Statically check pointer handling correctness

without programming restrictions?

 – Must use hardware

• Elbrus hardware supports dynamic pointer checking

7/22/2019 E2K - Elbrus

http://slidepdf.com/reader/full/e2k-elbrus 9/9

Advantages

• Simplicity

• Increased protection against virus attacks

• Value

• More efficient compilation

• Adaptability

• Multiple platforms on same computer

• High performance computing with real numbers

top related