pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

CrossFire Graphic Cards

Launched at Computex in the summer of 2005, ATI launched their own tandem graphics card solution, branded CrossFire, and comprising the following components:

  • Radeon CrossFire Edition graphics card with Compositing Engine
  • Secondary PCI Express graphics card with Radeon X800 or X850 series GPU
  • CrossFire Ready motherboard with dual PCI Express graphics slots
  • CrossFire driver support.

Unlike SLI, the two graphics cards in a CrossFire system do not have to be identical, and they have an exterior connection rather than an interior one. Moreover, only the master card needs to be a CrossFire device. This can be paired with any Radeon X850 or X800 card, making the ATI technology a viable upgrade option for many existing systems.

In a CrossFire system, each GPU has its own dedicated PCI Express link to the Northbridge of the motherboard chipset, and is allocated its own command buffer and non-local storage space in system memory. Allocating separate command buffers allows each GPU to be assigned its own unique set of tasks.

ATI

Another portion of system memory is set aside for sharing of data between the GPUs. Shared data includes synchronisation commands, textures, off-screen buffers, and other temporary data generated during the rendering process. This configuration takes advantage of the high speed bi-directional PCI Express links to ensure smooth, efficient co-operation between the GPUs.

When each GPU has completed its assigned tasks for a given frame, the resulting outputs are sent to the CrossFire Compositing Engine. This device combines the results from each GPU according to the selected operating mode, and sends the final frames out to the display device. It is capable of performing advanced blending operations without burdening either of the GPUs.

The key to maximising the speed of a multi-GPU system is to divide the rendering workload of each frame as efficiently as possible. It is also important to minimise any performance overhead caused by additional driver processing or synchronisation between the GPUs, while maintaining compatibility with a wide range of applications. To achieve this, the CrossFire driver chooses the most appropriate of the following three techniques to divide the rendering workload for each particular 3D application:

  • Alternate Frame Rendering (AFR); where all even frames are rendered on one GPU, while all odd frames are rendered on the other.
  • Supertiling; which works by dividing each frame to be rendered into a number of tiles in an alternating checkerboard pattern, such that half of the tiles are assigned to each of the two GPUs, and
  • Scissor; a similar process to that used by Nvidia’s SLI technology, in which each frame is split into two sections, with each being processed by one GPU.

CrossFire also supports a quality-oriented mode (Super AA), which exploits the additional processing power of a multi-GPU system to provide an even higher quality anti-aliasing capability.

  • How Do Computers Make Pictures?
  • Graphic Card Resolution
  • Graphic Card Colour Depth
  • Graphic Card Components
  • Graphic Card Memory
  • Graphic Card Driver Software
  • 3d Accelerated Graphic Cards
  • Graphic Card Geometry
  • 3D Rendering
  • FSAA Graphic Card Technology
  • Digital Graphic Cards
  • DVI Graphic Cards
  • HDCP Technology
  • Graphic Card HDMI Ports
  • Graphic Card Display Port
  • Unified Display Special Interest Group
  • DirectX
  • OpenGL technology
  • Direct3D
  • Talisman
  • Fahrenheit Graphic Cards
  • SLI Technology
  • CrossFire Graphic Cards

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Google+ (Opens in new window)

Related

Filed Under: Graphics Cards

Latest Articles

Motherboard CPU

Motherboard CPU

As indicated above - and this is not uncommon - the motherboard upgrade is being accompanied by a switch to a new processor and main memory. In this case the CPU has been used before, and hence the need for the CPU & Heatsink Cleaner. You'll need a lint-free cloth and thermal compound as well … [Read More...]

PC133 SDRAM

PC133 SDRAM

Although most of the industry agrees that Rambus is an inevitable stage in PC development, PC133 SDRAM is seen as a sensible evolutionary technology and one that confers a number of advantages that make it attractive to chip makers unsure of how … [Read More...]

Installing Windows 98 – Copying the Windows Files to Your Computer

Installing Windows 98 – Copying the Windows Files to Your Computer

After Setup finishes creating the Startup Disk, the Start Copying Files dialog box appears. After Setup has collected the information it needs from your computer, it begins copying the Windows 98 files to your computer. Click Next to start copying files. Windows 98 Setup does not require … [Read More...]


Eliminating Common WordPress Vulnerabilities to DDoS Attacks

Distributed Denial of Service (DDoS) attacks are serious threats that every website manager must be prepared for. Unfortunately, some of the most … [Read More...]

Securing Your Privacy Against Deep Packet Inspections

Network administrators, cybersecurity analysts and watchdogs use a variety of different tools to monitor Internet traffic. Deep packet inspection is … [Read More...]

Identifying and Protecting Against the Most Dangerous Keyloggers

Keyloggers are among the most frightening tools in the hands of a skilled hacker. They are malicious devices or malware applications that enable … [Read More...]

Excel Shortcuts for More Complicated Commands

We previously wrote an article on the benefits of using keyboard shortcuts in Excel. The shortcuts we focused on were used for simple formatting … [Read More...]

CleanTalk as Your Weapon against Spam

CleanTalk as Your Weapon against Spam

Are you tired of spam? You aren't alone. It has become a massive epidemic over the past few years. Around 14.5 billion spam messages are sent every … [Read More...]

VPN in 2019: Shortcut to Prevent Data Theft and Monitoring

VPN in 2019: Shortcut to Prevent Data Theft and Monitoring

Not all people are in the know about the beneficial functions of Virtual Private Networks. Some users install them to unblock torrenting sites, for … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

ADSL Filters

Because ADSL uses high frequency signals that are outside the range the human ear is capable of hearing, the service can operate over the same pair … [Read More...]

Ethernet

Ethernet was developed in the mid 1970s by the Xerox Corporation, and in 1979 Digital Equipment Corporation DEC) and Intel joined forces with Xerox to … [Read More...]

SCSI Adapters

The SCSI host adapter we're going to be installing is a model capable of supporting SCSI-1, SCSI-2 and Fast SCSI-2 devices. This provides a level of … [Read More...]

Return to top of page

Copyright © 2019 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors