pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Moore’s Law in IT Architecture

According to Moore’s Law formulated in 1965 by Gordon Moore, co-founder of Intel), the number of transistors per integrated circuit would double every 18 months. Moore predicted that this trend would hold for the next ten years. In fact, as the graph illustrates, Intel has managed to doggedly follow this law for far longer. In 1978 the 8086 ran at 4.77MHz and had less than 30,000 transistors. By the end of the millennium the Pentium 4 had a staggering 42 million on-chip transistors and ran at 1.5GHz.

Moore's

The laws of physics limit designers from increasing the clock speed indefinitely, and although clock rates go up every year, this alone wouldn’t give the performance gains we’re used to. This is the reason why engineers are constantly looking for ways to get the processor to undertake more work in each tick of the clock. One approach is to widen the data bus and registers. Even a 4-bit processor can add together two 32-bit numbers, but this takes lots of instructions, whereas a 32-bit processor could do the task in a single instruction. Most of today’s processors have a 32-bit architecture, but 64-bit variants are on the way.

In the early days, processors could only deal with integers, or whole numbers. It was possible to write a program using simple instructions to deal with fractional numbers, but it would be slow. Virtually all processors today have instructions to handle floating point numbers directly.

To say that things happen with each tick of the clock underestimates how long it actually takes to execute an instruction. Traditionally, it took five ticks – one to load the instruction, one to decode it, one to get the data, one to execute it and one to write the result. In this case it is evident that a 100MHz processor would only be able to execute 20 million instructions per second.

Most processors now employ pipelining, which is rather like a factory production line. One stage in the pipeline is dedicated to each of the stages needed to execute an instruction, and each stage passes the instruction on to the next stage when it is finished with it. This means that at any one time, one instruction is being loaded, another is being decoded, data is being fetched for a third, a fourth is actually being executed and the result is being written for a fifth. With current technology, one instruction per clock cycle can be achieved.

Furthermore, many processors now have a superscalar architecture. This means that the circuitry for each stage of the pipeline is duplicated, so that multiple instructions can pass through in parallel. 1995’s Pentium Pro, for example, was able to execute up to five instructions per clock cycle.

  • Principles of CPU architecture – logic gates, MOSFETS and voltage
  • Basic structure of a Pentium microprocessor
  • Microprocessor Evolution
  • IA-32 (Intel Architecture 32 ) – base instruction set for 32 bit processors
  • Pentium P5 microarchitecture – superscalar and 64 bit data
  • Pentium Pro (P6) 6th generation x86 microarchitecture
  • Dual Independent Bus (DIB) – frontside and backside data bus CPU architecture
  • NetBurst – Pentium 4 7th generation x86 CPU microarchitecture
  • Intel Core – 8th generation CPU architecture
  • Moore’s Law in IT Architecture
  • Architecture Manufacturing Process
  • Copper Interconnect Architecture
  • TeraHertz Technology
  • Software Compatibility
  • IA-64 Architecture
  • Illustrated guide to high-k dielectrics and metal gate electrodes

Filed Under: CPU Architecture

Latest Articles

Remove System Tool 2011

System Tool 2011, also known as just System Tool is a FALSE security client. This client appears to be very similar to past fake security clients like Security Tool. We installed this virus on a test computer to see what this threat does and to create working manual removal guide. We are … [Read More...]

What Is the Role of Google Analytics in Advertising a Cannabis Site?

In recent years, cannabis businesses have started to embrace SEO. Yet, many of them are still skeptical of digital analytics. This is a big mistake as thriving in the modern economy requires a website and a reliable system to track its performance. Google Analytics is the cornerstone of … [Read More...]

AMD Athlon

The launch of the Athlon processor, in the summer of 1999, represented a major coup for AMD. It allowed them to boast not only of having produced the first seventh-generation processor - there are enough radical architectural differences … [Read More...]

A Harsh Reality You Can’t Ignore About Network Information Security

We are becoming more and more connected to our lives with computer technology. They help to process data at work. We receive money using plastic … [Read More...]

What is the Best VPN for Gamers?

Of the 44% of UK Internet users who have used a virtual private network (VPN) at some point in their lives, approximately 39% of this demographic are … [Read More...]

Think About Headless Commerce as of a Modular System

In recent years, eCommerce has transformed to where consumers no longer handle purchases on conventional websites. Shopping is currently carried out … [Read More...]

Service That Succeeds: How To Build an Effective IT Service Desk

In today’s tech-forward world, building a capable IT service team is essential for businesses hoping to scale tech-related hurdles and soar past the … [Read More...]

A simple PC guide on keeping safe while using public Wi-Fi

Did you know that there is a cyberattack every 39 seconds? You are more likely to be a victim if you are lax about your digital security. This … [Read More...]

Motivating Students to Learn Computer Science

Computer science has been an important part of the educational curriculum for decades. Professor Seymour Papert, a mathematician from South Africa … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

How to Remove Internet Security 2014 Virus

Internet Security 2014 is a rogue anti virus program. This program pretends to be an anti virus client that finds viruses on computers. In reality … [Read More...]

Win98 Installation

After you've partitioned and formatted your hard disk, you're ready to reinstall Windows 98: Insert the Windows 98 Startup disk in the floppy disk … [Read More...]

Antivirus IS Removal Process

which is programmed to give false security alerts to a user once it gets access to his/her system. This particular software can spread by Trojans, … [Read More...]

[footer_backtotop]

Copyright © 2022 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors