Date post: | 08-Feb-2018 |
Category: |
Documents |
Upload: | andrew-chesney |
View: | 243 times |
Download: | 0 times |
7/22/2019 E2K - Elbrus
http://slidepdf.com/reader/full/e2k-elbrus 1/9
The Elbrus 2000 (E2K)
ExpLicit Basic Resource Utilization
Scheduling (ELBRUS)
By: Andrew Chesney
7/22/2019 E2K - Elbrus
http://slidepdf.com/reader/full/e2k-elbrus 2/9
History
• Goal: A fast, reliable,compatible, andsecure computer
• Boris Babayan • Elbrus-1 (1979)
• Elbrus-2 (1984)
• Elbrus-3 (1991)
• Elbrus-3M1 (2005) – This was the first computer basedon the Elbrus 2000 architecture.
• Monoblock KM-4 (2012)
7/22/2019 E2K - Elbrus
http://slidepdf.com/reader/full/e2k-elbrus 3/9
7/22/2019 E2K - Elbrus
http://slidepdf.com/reader/full/e2k-elbrus 4/9
Compatible
• Supports two ISA’s: • Elbrus VLIW
– Computer doesn’t need to run at a high clock speed to
perform fast
•Intel x86
– Transparency of binary compiled code
– Binary translation system creates a virtual machine which runs
the guest OS for the x86 architecture
– Runs almost exactly as it would on x86 computer
7/22/2019 E2K - Elbrus
http://slidepdf.com/reader/full/e2k-elbrus 5/9
Fast
• The compiler is able to analyze source code
more carefully than hardware RISC/CISC
processors.
– This allows for more independent operations to be
found.
• Increases Instruction Level Parallelism
–
Able to run more independent operations simultaneously
• Can execute up to 23 operations per clock.
7/22/2019 E2K - Elbrus
http://slidepdf.com/reader/full/e2k-elbrus 6/9
Reliability (HW)
• All units have extra HW for:
– Detecting single hardware faults and reporting
them to the rest of the system
– Disconnects all signal lines from faulty unit
• Basically impossible for the system to deliver a
wrong result without any signal of alarm
7/22/2019 E2K - Elbrus
http://slidepdf.com/reader/full/e2k-elbrus 7/9
Reliability (SW)
• “The wisdom is simple – data types (for securitypointers only) should be handled correctly”
• Support for data and procedure pointers – All pointers marked by special bit
• Allows HW to check for proper pointer handling
• This strategy allows for: – Decreased debugging time
– Decreased probability of missing an undetected bug inalready delivered software
– Ensures perfect protection between separateprocedures in same virtual space
7/22/2019 E2K - Elbrus
http://slidepdf.com/reader/full/e2k-elbrus 8/9
Secure
• All data accessed through address information
• (references and pointers)
• If pointers are handled properly
– System is secure
• Statically check pointer handling correctness
without programming restrictions?
– Must use hardware
• Elbrus hardware supports dynamic pointer checking
7/22/2019 E2K - Elbrus
http://slidepdf.com/reader/full/e2k-elbrus 9/9
Advantages
• Simplicity
• Increased protection against virus attacks
• Value
• More efficient compilation
• Adaptability
• Multiple platforms on same computer
• High performance computing with real numbers