Comparison of two data hazard handling schemes for asynchronous pipelined processors

Meng Chou Chang*, Da Sen Shiau

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Since asynchronous logic adopts a distributed control scheme, the traditional methods for handling hazards in synchronous processors cannot be directly applied to asynchronous processors. Recently, the data hazard detection table (DHDT) scheme has been regarded as an effective method for handling data hazards in asynchronous processors. In this paper, two asynchronous data hazard handling schemes, the DHDT scheme and the proposed destination register chain (DRC) scheme, are compared in terms of performance and hardware complexity. In order to evaluate these two data hazard handling schemes, we have used the Balsa asynchronous synthesis system to implement two asynchronous pipelined processors, AsynRISC-DHDT and AsynRISC-DRC, which employ DHDT and DRC, respectively, to deal with data hazards. Experimental results show that AsynRISC-DRC can achieve a 13% reduction in hardware area cost and a performance gain of 22.1% compared with AsynRISC-DHDT.

Original languageEnglish
Title of host publicationProceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010
Pages36-40
Number of pages5
DOIs
StatePublished - 2010
Externally publishedYes
Event2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010 - Chengdu, China
Duration: 09 07 201011 07 2010

Publication series

NameProceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010
Volume4

Conference

Conference2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010
Country/TerritoryChina
CityChengdu
Period09/07/1011/07/10

Keywords

  • Asynchronous logic
  • Data hazard
  • Data hazard detection table
  • Pipelined processor

Fingerprint

Dive into the research topics of 'Comparison of two data hazard handling schemes for asynchronous pipelined processors'. Together they form a unique fingerprint.

Cite this