Performance monitoring with Intel Architecture
|
|
|
- Edgar Higgins
- 10 years ago
- Views:
Transcription
1 Performance monitoring with Intel Architecture CSCE 351: Operating System Kernels Lecture 5.2 Why performance monitoring? Fine-tune software Book-keeping Locating bottlenecks Explore potential problems or hidden problems Why do you need to fine tune your software Performance, performance, performance Cache misses, page faults
2 A JVM problem Imagine Three major components Execution Memory management Synchronization How would you measure the execution time of each component? Or what about Multithreaded application Measure synchronization time Measure amount of time in contention Measure amount of time setting lock Measure bus contention How would you do it?
3 Time-stamp Counter Pentium defines a time-stamp counter mechanism used to monitor and identify the relative time of occurrence of processor events the architecture includes instruction RDTSC is used to read the counter (a 64 bit register) a feature bit (TCS flag) that can be read with the CPUID instruction, a time-stamp counter disable bit (TSD flag) in control register CR4 a model-specific time-stamp counter Time-stamp Counter (cont.) Following execution of the CPUID instruction the TSC flag in register EDX (bit 4) indicates (when set) that the time-stamp counter is present in a particular Intel Architecture processor implementation. The time-stamp counter is a 64-bit counter that is set to 0 following the hardware reset of the processor
4 Time-stamp Counter (cont.) the time-stamp counter will increment ~6.3 x times per year at 200 MHz clock rate it would take over 2000 years for the counter to wrap around The RDTSC instruction loads the current count of the time-stamp counter into the EDX:EAX registers Time-stamp Counter (cont.) the RDTSC instruction can be executed by programs and procedures running at any privilege level The TSD flag in control register CR4 (bit 2) allows use of this instruction to be restricted to only programs and procedures running at privilege level 0.
5 Time-stamp Counter (cont.) Since instructions in Pentium Pro and later can finish out of order The RDTSC instruction is not serializing or ordered with other instructions. it does not necessarily wait until all previous instructions have been executed before reading the counter. subsequent instructions may begin execution before the RDTSC instruction operation is performed. Performance Counters the P6 family also provides two 40-bit performance counters count the number of events or measure duration When counting event a counter is incremented each time a specified event takes place
6 Performance counters (cont.) When measuring duration a counter counts the number of processor clocks that occur while a specified condition is true The counters can count events or measure durations that occur at any privilege level. Performance counters (cont.) There are four MSR (Model Specific Registers) that are used to support performance counters PerfEvtSel0 and PerfEvtSel1 are used to select the events (32-bit) PerfCtr0 and PerfCtr1 are used to count the number of occurrences (40-bit)
7 Performance counters (cont.) Performance counters (cont.) RDMSR and WRMSR instructions are used to read and write to these MSR at privilege 0 RDMSR: MSR -> EDX:EAX registers WRMSR: EDX:EAX -> MSR the PerfCtr0 and PerfCtr1 MSRs can be read from any privilege level using the RDPMC (read performance-monitoring counters) instruction.
8 Performance Counters (cont.) Starting and stopping the performance counters start by writing valid setup information in the PerfEvtSel0 and/or PerfEvtSel1 and setting the enable flag in the PerfEvtSel0. The counter begins after the execution of WRMSR Counter can be stop by clearing the enable counters flag or clearing all bit in PerfEvtSel0 and 1 Performance Counters (cont.) if (ECX == 0) { EDX:EAX = perfctr0; } else if (ECX == 1) { EDX:EAX = perfctr1; }
9 Performance Counters (cont.) XOR ECX, ECX RDPMC MOV [MEM1], EAX MOV [MEM2], EDX ADD EDX, EAX RDPMC Monitoring Software to use the counters, the OS needs to provide an event-monitoring device driver that provides feature checking (check CPUID return value) initializes and starts counters stops counters reads the the counters or read the time-stamp counters
10 Sample Events clocks(79h) branch misprediction (C5H) data cache reference (43H) instruction fetch (80H)
CPU performance monitoring using the Time-Stamp Counter register
CPU performance monitoring using the Time-Stamp Counter register This laboratory work introduces basic information on the Time-Stamp Counter CPU register, which is used for performance monitoring. The
Intel Xeon Phi Coprocessor (codename: Knights Corner) Performance Monitoring Units
Intel Xeon Phi Coprocessor (codename: Knights Corner) Performance Monitoring Units Revision: 1.01 Last Modified: July 10, 2012 Document Number: 327357-001 Page 1 INFORMATION IN THIS DOCUMENT IS PROVIDED
Using the RDTSC Instruction for Performance Monitoring
Using the Instruction for Performance Monitoring http://developer.intel.com/drg/pentiumii/appnotes/pm1.htm Using the Instruction for Performance Monitoring Information in this document is provided in connection
Intel 64 and IA-32 Architectures Software Developer s Manual
Intel 64 and IA-32 Architectures Software Developer s Manual Volume 3B: System Programming Guide, Part 2 NOTE: The Intel 64 and IA-32 Architectures Software Developer's Manual consists of eight volumes:
Intel Processor Serial Number
APPLICATION NOTE Intel Processor Serial Number March 1999 ORDER NUMBER: 245125-001 Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel
Intel Vanderpool Technology for IA-32 Processors (VT-x) Preliminary Specification
Intel Vanderpool Technology for IA-32 Processors (VT-x) Preliminary Specification Order Number C97063-001 January 2005 THIS DOCUMENT AND RELATED MATERIALS AND INFORMATION ARE PROVIDED "AS IS" WITH NO WARRANTIES,
These are Not Your Grand Daddy's CPU Performance Counters
These are Not Your Grand Daddy's CPU Performance Counters CPU Hardware Performance Counters for Security Your Presenters Today Nishad Herath [email protected] & Anders Fogh [email protected]
Programming Guide. Intel Microarchitecture Codename Nehalem Performance Monitoring Unit Programming Guide (Nehalem Core PMU)
Programming Guide Intel Microarchitecture Codename Nehalem Performance Monitoring Unit Programming Guide (Nehalem Core PMU) Table of Contents 1. About this document... 8 2. Nehalem-based PMU Architecture...
Hardware Assisted Virtualization Intel Virtualization Technology
Hardware Assisted Virtualization Intel Virtualization Technology Matías Zabaljáuregui [email protected] Buenos Aires, Junio de 2008 1 Index 1 Background, motivation and introduction to Intel Virtualization
Intel Virtualization Technology Specification for the IA-32 Intel Architecture
Intel Virtualization Technology Specification for the IA-32 Intel Architecture C97063-002 April 2005 THIS DOCUMENT AND RELATED MATERIALS AND INFORMATION ARE PROVIDED AS IS WITH NO WARRANTIES, EXPRESS OR
KVM as a Microsoft-compatible hypervisor.
KVM as a Microsoft-compatible hypervisor. Vadim Rozenfeld KVM Forum, 2012 1 Agenda Microsoft Enlightenment KVM as a conformant hypervisor Performance Improvments 2 Microsoft Enlightenment
Intel Virtualization Technology FlexMigration Application Note
Intel Virtualization Technology FlexMigration Application Note This document is intended only for VMM or hypervisor software developers and not for application developers or end-customers. Readers are
matasano Hardware Virtualization Rootkits Dino A. Dai Zovi
Hardware Virtualization Rootkits Dino A. Dai Zovi Agenda Introductions Virtualization (Software and Hardware) Intel VT-x (aka Vanderpool ) VM Rootkits Implementing a VT-x based Rootkit Detecting Hardware-VM
Operating Systems. Lecture 03. February 11, 2013
Operating Systems Lecture 03 February 11, 2013 Goals for Today Interrupts, traps and signals Hardware Protection System Calls Interrupts, Traps, and Signals The occurrence of an event is usually signaled
Intel Virtualization Technology and Extensions
Intel Virtualization Technology and Extensions Rochester Institute of Technology Prepared and Presented by: Swapnil S. Jadhav (Computer Engineering) Chaitanya Gadiyam (Computer Engineering) 1 Agenda Virtualization
Intel Virtualization Technology FlexMigration Application Note
Intel Virtualization Technology FlexMigration Application Note This document is intended only for VMM or hypervisor software developers and not for application developers or end-customers. Readers are
Transparent ROP Detection using CPU Performance Counters. 他 山 之 石, 可 以 攻 玉 Stones from other hills may serve to polish jade
Transparent ROP Detection using CPU Performance Counters 他 山 之 石, 可 以 攻 玉 Stones from other hills may serve to polish jade Xiaoning Li Michael Crouse Intel Labs Harvard University THREADS Conference 2014
A Study on Performance Monitoring Counters in x86-architecture
A Study on Performance Monitoring Counters in x86-architecture Shibdas Bandyopadhyay Roll No. MTC0414 M.Tech CS 1 st Year Indian Statistical Institute 1 Table of Contents 1. Introduction... 3 2. Hardware
Addendum Intel Architecture Software Developer s Manual
Addendum Intel Architecture Software Developer s Manual Volume 3: System Programming Guide Order Number: 243690-001 NOTE: The Intel Architecture Software Developer s Manual consists of the following volumes:
Intel 64 Architecture x2apic Specification
Intel 64 Architecture x2apic Specification Reference Number: 318148-004 March 2010 i INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL
Chapter 02: Computer Organization. Lesson 04: Functional units and components in a computer organization Part 3 Bus Structures
Chapter 02: Computer Organization Lesson 04: Functional units and components in a computer organization Part 3 Bus Structures Objective: Understand the IO Subsystem and Understand Bus Structures Understand
Using PAPI for hardware performance monitoring on Linux systems
Using PAPI for hardware performance monitoring on Linux systems Jack Dongarra, Kevin London, Shirley Moore, Phil Mucci, and Dan Terpstra Innovative Computing Laboratory, University of Tennessee, Knoxville,
Administration. Instruction scheduling. Modern processors. Examples. Simplified architecture model. CS 412 Introduction to Compilers
CS 4 Introduction to Compilers ndrew Myers Cornell University dministration Prelim tomorrow evening No class Wednesday P due in days Optional reading: Muchnick 7 Lecture : Instruction scheduling pr 0 Modern
Hardware performance monitoring. Zoltán Majó
Hardware performance monitoring Zoltán Majó 1 Question Did you take any of these lectures: Computer Architecture and System Programming How to Write Fast Numerical Code Design of Parallel and High Performance
Why Computers Are Getting Slower (and what we can do about it) Rik van Riel Sr. Software Engineer, Red Hat
Why Computers Are Getting Slower (and what we can do about it) Rik van Riel Sr. Software Engineer, Red Hat Why Computers Are Getting Slower The traditional approach better performance Why computers are
Hardware-based performance monitoring with VTune Performance Analyzer under Linux
Hardware-based performance monitoring with VTune Performance Analyzer under Linux Hassan Shojania [email protected] Abstract All new modern processors have hardware support for monitoring processor performance.
A Study of Performance Monitoring Unit, perf and perf_events subsystem
A Study of Performance Monitoring Unit, perf and perf_events subsystem Team Aman Singh Anup Buchke Mentor Dr. Yann-Hang Lee Summary Performance Monitoring Unit, or the PMU, is found in all high end processors
A High Resolution Performance Monitoring Software on the Pentium
A High Resolution Performance Monitoring Software on the Pentium Ong Cheng Soon*, Fadhli Wong Mohd Hasan Wong**, Lai Weng Kin* * Software Lab, MIMOS Berhad [email protected], [email protected] ** Dept of Electrical
Computer-System Architecture
Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection General System Architecture 2.1 Computer-System Architecture 2.2 Computer-System
Multi-Threading Performance on Commodity Multi-Core Processors
Multi-Threading Performance on Commodity Multi-Core Processors Jie Chen and William Watson III Scientific Computing Group Jefferson Lab 12000 Jefferson Ave. Newport News, VA 23606 Organization Introduction
Intel 64 and IA-32 Architectures Software Developer s Manual
Intel 64 and IA-32 Architectures Software Developer s Manual Volume 3A: System Programming Guide, Part 1 NOTE: The Intel 64 and IA-32 Architectures Software Developer's Manual consists of eight volumes:
STUDY OF PERFORMANCE COUNTERS AND PROFILING TOOLS TO MONITOR PERFORMANCE OF APPLICATION
STUDY OF PERFORMANCE COUNTERS AND PROFILING TOOLS TO MONITOR PERFORMANCE OF APPLICATION 1 DIPAK PATIL, 2 PRASHANT KHARAT, 3 ANIL KUMAR GUPTA 1,2 Depatment of Information Technology, Walchand College of
Operating Systems. Virtual Memory
Operating Systems Virtual Memory Virtual Memory Topics. Memory Hierarchy. Why Virtual Memory. Virtual Memory Issues. Virtual Memory Solutions. Locality of Reference. Virtual Memory with Segmentation. Page
CHAPTER 6 TASK MANAGEMENT
CHAPTER 6 TASK MANAGEMENT This chapter describes the IA-32 architecture s task management facilities. These facilities are only available when the processor is running in protected mode. 6.1. TASK MANAGEMENT
Intel TSX (Transactional Synchronization Extensions) Mike Dai Wang and Mihai Burcea
Intel TSX (Transactional Synchronization Extensions) Mike Dai Wang and Mihai Burcea 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Example: toy banking application with RTM Code written and tested in
AMD Processor Recognition Application Note. For Processors Prior to AMD Family 0Fh Processors
AMD Processor Recognition Application Note For Processors Prior to Publication # 20734 Revision: 3.13 Issue Date: December 2005 1997 2004 Advanced Micro Devices, Inc. All rights reserved. The contents
Application Note 195. ARM11 performance monitor unit. Document number: ARM DAI 195B Issued: 15th February, 2008 Copyright ARM Limited 2007
Application Note 195 ARM11 performance monitor unit Document number: ARM DAI 195B Issued: 15th February, 2008 Copyright ARM Limited 2007 Copyright 2007 ARM Limited. All rights reserved. Application Note
Intel Xeon Phi Coprocessor System Software Developers Guide
Intel Xeon Phi Coprocessor System Software Developers Guide Revision: 2.03 Last Modified: November 8, 2012 IBL Doc ID: 488596 Page 1 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS.
Synchronization. Todd C. Mowry CS 740 November 24, 1998. Topics. Locks Barriers
Synchronization Todd C. Mowry CS 740 November 24, 1998 Topics Locks Barriers Types of Synchronization Mutual Exclusion Locks Event Synchronization Global or group-based (barriers) Point-to-point tightly
Overview. CISC Developments. RISC Designs. CISC Designs. VAX: Addressing Modes. Digital VAX
Overview CISC Developments Over Twenty Years Classic CISC design: Digital VAX VAXÕs RISC successor: PRISM/Alpha IntelÕs ubiquitous 80x86 architecture Ð 8086 through the Pentium Pro (P6) RJS 2/3/97 Philosophy
Performance Test Results Report for the Sled player
Performance Test Results Report for the Sled player The Open University Created: 17 th April 2007 Author Simon Hutchinson The Open University Page 1 of 21 Cross References None
Intel Xeon Phi Coprocessor System Software Developers Guide. SKU# 328207-003EN March, 2014
Intel Xeon Phi Coprocessor System Software Developers Guide SKU# 328207-003EN March, 2014 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY
Lecture 3: Modern GPUs A Hardware Perspective Mohamed Zahran (aka Z) [email protected] http://www.mzahran.com
CSCI-GA.3033-012 Graphics Processing Units (GPUs): Architecture and Programming Lecture 3: Modern GPUs A Hardware Perspective Mohamed Zahran (aka Z) [email protected] http://www.mzahran.com Modern GPU
CS:APP Chapter 4 Computer Architecture. Wrap-Up. William J. Taffe Plymouth State University. using the slides of
CS:APP Chapter 4 Computer Architecture Wrap-Up William J. Taffe Plymouth State University using the slides of Randal E. Bryant Carnegie Mellon University Overview Wrap-Up of PIPE Design Performance analysis
Page Modification Logging for Virtual Machine Monitor White Paper
Page Modification Logging for Virtual Machine Monitor White Paper This document is intended only for VMM or hypervisor software developers and not for application developers or end-customers. Readers are
Intel 64 and IA-32 Architectures Software Developer s Manual
Intel 64 and IA-32 Architectures Software Developer s Manual Volume 3A: System Programming Guide, Part 1 NOTE: The Intel 64 and IA-32 Architectures Software Developer's Manual consists of five volumes:
I/O. Input/Output. Types of devices. Interface. Computer hardware
I/O Input/Output One of the functions of the OS, controlling the I/O devices Wide range in type and speed The OS is concerned with how the interface between the hardware and the user is made The goal in
THE BASICS OF PERFORMANCE- MONITORING HARDWARE
THE BASICS OF PERFORMANCE- MONITORING HARDWARE PERFORMANCE-MONITORING FEATURES PROVIDE DATA THAT DESCRIBE HOW AN APPLICATION AND THE OPERATING SYSTEM ARE PERFORMING ON THE PROCESSOR. THIS INFORMATION CAN
Intel Pentium M Processor Specification Update
Intel Pentium M Processor Specification Update August 2008 Notice: The Intel Pentium M processor may contain design defects or errors known as errata which may cause the product to deviate from published
Lesson-16: Real time clock DEVICES AND COMMUNICATION BUSES FOR DEVICES NETWORK
DEVICES AND COMMUNICATION BUSES FOR DEVICES NETWORK Lesson-16: Real time clock 1 Real Time Clock (RTC) A clock, which is based on the interrupts at preset intervals. An interrupt service routine executes
Computer Organization and Components
Computer Organization and Components IS5, fall 25 Lecture : Pipelined Processors ssociate Professor, KTH Royal Institute of Technology ssistant Research ngineer, University of California, Berkeley Slides
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
Managing and Monitoring Windows 7 Performance Lesson 8
Managing and Monitoring Windows 7 Performance Lesson 8 Objectives Configure Windows Updates with Windows Update Client and WSUS Monitor Windows Performance using Event Viewer, Performance Information and
More on Pipelining and Pipelines in Real Machines CS 333 Fall 2006 Main Ideas Data Hazards RAW WAR WAW More pipeline stall reduction techniques Branch prediction» static» dynamic bimodal branch prediction
Lecture 7: Machine-Level Programming I: Basics Mohamed Zahran (aka Z) [email protected] http://www.mzahran.com
CSCI-UA.0201-003 Computer Systems Organization Lecture 7: Machine-Level Programming I: Basics Mohamed Zahran (aka Z) [email protected] http://www.mzahran.com Some slides adapted (and slightly modified)
Windows Server Virtualization & The Windows Hypervisor. Background and Architecture Reference
Windows Server Virtualization & The Windows Hypervisor Background and Architecture Reference Brandon Baker Lead Security Engineer Windows Kernel Team Microsoft Corporation Agenda - Windows Server Virtualization
Basics of VTune Performance Analyzer. Intel Software College. Objectives. VTune Performance Analyzer. Agenda
Objectives At the completion of this module, you will be able to: Understand the intended purpose and usage models supported by the VTune Performance Analyzer. Identify hotspots by drilling down through
Intel 8086 architecture
Intel 8086 architecture Today we ll take a look at Intel s 8086, which is one of the oldest and yet most prevalent processor architectures around. We ll make many comparisons between the MIPS and 8086
ZCL for SONYGigECAM Introduction Manual
ZCL for SONYGigECAM Introduction Manual Copyright 2012 Sony Corporation Contents ZCL for SONYGigECAM Install Manual Introduction... - 2 - Operation Environment... - 2 - Installation... - 3 - Installation...
Abysssec Research. 1) Advisory information. 2) Vulnerable version
Abysssec Research 1) Advisory information Title Version Discovery Vendor Impact Contact Twitter CVE : Apple QuickTime FlashPix NumberOfTiles Remote Code Execution Vulnerability : QuickTime player 7.6.5
Jorix kernel: real-time scheduling
Jorix kernel: real-time scheduling Joris Huizer Kwie Min Wong May 16, 2007 1 Introduction As a specialized part of the kernel, we implemented two real-time scheduling algorithms: RM (rate monotonic) and
Computer Systems Structure Input/Output
Computer Systems Structure Input/Output Peripherals Computer Central Processing Unit Main Memory Computer Systems Interconnection Communication lines Input Output Ward 1 Ward 2 Examples of I/O Devices
Using Hardware Performance Events for Instruction-Level Monitoring on the x86 Architecture
Using Hardware Performance Events for Instruction-Level Monitoring on the x86 Architecture Sebastian Vogl Department of Computer Science Technische Universität München Munich, Germany {vogls,eckertc}@in.tum.de
8051 hardware summary
8051 hardware summary 8051 block diagram 8051 pinouts + 5V ports port 0 port 1 port 2 port 3 : dual-purpose (general-purpose, external memory address and data) : dedicated (interfacing to external devices)
CSC 2405: Computer Systems II
CSC 2405: Computer Systems II Spring 2013 (TR 8:30-9:45 in G86) Mirela Damian http://www.csc.villanova.edu/~mdamian/csc2405/ Introductions Mirela Damian Room 167A in the Mendel Science Building [email protected]
Computer Architectures
Computer Architectures 2. Instruction Set Architectures 2015. február 12. Budapest Gábor Horváth associate professor BUTE Dept. of Networked Systems and Services [email protected] 2 Instruction set architectures
Technical Note. Micron NAND Flash Controller via Xilinx Spartan -3 FPGA. Overview. TN-29-06: NAND Flash Controller on Spartan-3 Overview
Technical Note TN-29-06: NAND Flash Controller on Spartan-3 Overview Micron NAND Flash Controller via Xilinx Spartan -3 FPGA Overview As mobile product capabilities continue to expand, so does the demand
AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES-NI -
AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES-NI - Tatsuya TAKEHISA, Hiroki NOGAWA, and Masakatu MORII Abstract. In this paper, we propose a method
User s Manual For Installation of Imposa Software. Version: V1.0
User s Manual For Installation of Imposa Software Version: V1.0 Special Notes All rights reserved. Any part of this manual is not allowed to be reproduced or transmitted in any form or by any means, electronic
Virtualization Detection: New Strategies and Their Effectiveness
Virtualization Detection: New Strategies and Their Effectiveness Christopher Thompson [email protected] Maria Huntley [email protected] Chad Link [email protected] ABSTRACT Previous methods for detecting
Learning Outcomes. Simple CPU Operation and Buses. Composition of a CPU. A simple CPU design
Learning Outcomes Simple CPU Operation and Buses Dr Eddie Edwards [email protected] At the end of this lecture you will Understand how a CPU might be put together Be able to name the basic components
CS5460: Operating Systems. Lecture: Virtualization 2. Anton Burtsev March, 2013
CS5460: Operating Systems Lecture: Virtualization 2 Anton Burtsev March, 2013 Paravirtualization: Xen Full virtualization Complete illusion of physical hardware Trap _all_ sensitive instructions Virtualized
Intel Core TM i7-660ue, i7-620le/ue, i7-610e, i5-520e, i3-330e and Intel Celeron Processor P4505, U3405 Series
Intel Core TM i7-660ue, i7-620le/ue, i7-610e, i5-520e, i3-330e and Intel Celeron Processor P4505, U3405 Series Datasheet Addendum Specification Update Document Number: 323179 Legal Lines and Disclaimers
Dualog Connection Suite Hardware and Software Requirements
Dualog Connection Suite Hardware and Software Requirements Author Kristian Olsen Date 29.Mar 2012 Description Revision Number 2.0 Environmental requirements and recommendations running Dualog Connection
CPU Organization and Assembly Language
COS 140 Foundations of Computer Science School of Computing and Information Science University of Maine October 2, 2015 Outline 1 2 3 4 5 6 7 8 Homework and announcements Reading: Chapter 12 Homework:
Introduction. What is an Operating System?
Introduction What is an Operating System? 1 What is an Operating System? 2 Why is an Operating System Needed? 3 How Did They Develop? Historical Approach Affect of Architecture 4 Efficient Utilization
Intel 64 and IA-32 Architectures Software Developer s Manual
Intel 64 and IA-32 Architectures Software Developer s Manual Documentation Changes December 2015 Notice: The Intel 64 and IA-32 architectures may contain design defects or errors known as errata that may
CoE3DJ4 Digital Systems Design. Chapter 4: Timer operation
CoE3DJ4 Digital Systems Design Chapter 4: Timer operation Timer There are two 16-bit timers each with four modes of operation Timers are used for (a) interval timing, (b) event counting or (c) baud rate
l C-Programming l A real computer language l Data Representation l Everything goes down to bits and bytes l Machine representation Language
198:211 Computer Architecture Topics: Processor Design Where are we now? C-Programming A real computer language Data Representation Everything goes down to bits and bytes Machine representation Language
The WIMP51: A Simple Processor and Visualization Tool to Introduce Undergraduates to Computer Organization
The WIMP51: A Simple Processor and Visualization Tool to Introduce Undergraduates to Computer Organization David Sullins, Dr. Hardy Pottinger, Dr. Daryl Beetner University of Missouri Rolla Session I.
Virtualization Technologies
12 January 2010 Virtualization Technologies Alex Landau ([email protected]) IBM Haifa Research Lab What is virtualization? Virtualization is way to run multiple operating systems and user applications on
CPU Monitoring With DTS/PECI
White Paper Michael Berktold Thermal/Mechanical Engineer Tian Tian Technical Marketing Engineer Intel Corporation CPU Monitoring With DTS/PECI September 2010 322683 Executive Summary This document describes
Performance Tuning and Optimizing SQL Databases 2016
Performance Tuning and Optimizing SQL Databases 2016 http://www.homnick.com [email protected] +1.561.988.0567 Boca Raton, Fl USA About this course This four-day instructor-led course provides students
Computer Organization. and Instruction Execution. August 22
Computer Organization and Instruction Execution August 22 CSC201 Section 002 Fall, 2000 The Main Parts of a Computer CSC201 Section Copyright 2000, Douglas Reeves 2 I/O and Storage Devices (lots of devices,
SYSTEM ecos Embedded Configurable Operating System
BELONGS TO THE CYGNUS SOLUTIONS founded about 1989 initiative connected with an idea of free software ( commercial support for the free software ). Recently merged with RedHat. CYGNUS was also the original
Storage. The text highlighted in green in these slides contain external hyperlinks. 1 / 14
Storage Compared to the performance parameters of the other components we have been studying, storage systems are much slower devices. Typical access times to rotating disk storage devices are in the millisecond
Solution: start more than one instruction in the same clock cycle CPI < 1 (or IPC > 1, Instructions per Cycle) Two approaches:
Multiple-Issue Processors Pipelining can achieve CPI close to 1 Mechanisms for handling hazards Static or dynamic scheduling Static or dynamic branch handling Increase in transistor counts (Moore s Law):
A Hypervisor IPS based on Hardware assisted Virtualization Technology
A Hypervisor IPS based on Hardware assisted Virtualization Technology 1. Introduction Junichi Murakami ([email protected]) Fourteenforty Research Institute, Inc. Recently malware has become more
The team that wrote this redbook Comments welcome Introduction p. 1 Three phases p. 1 Netfinity Performance Lab p. 2 IBM Center for Microsoft
Foreword p. xv Preface p. xvii The team that wrote this redbook p. xviii Comments welcome p. xx Introduction p. 1 Three phases p. 1 Netfinity Performance Lab p. 2 IBM Center for Microsoft Technologies
Operating Systems 4 th Class
Operating Systems 4 th Class Lecture 1 Operating Systems Operating systems are essential part of any computer system. Therefore, a course in operating systems is an essential part of any computer science
Detecting Hardware Keyloggers. Fabian Mihailowitsch November 26, 2010
Detecting Hardware Keyloggers Fabian Mihailowitsch November 26, 2010 Who? Fabian Mihailowitsch Former Software Developer German energy combine IT-Security Consultant cirosec GmbH Penetration Tests Source
Computer Architecture Lecture 2: Instruction Set Principles (Appendix A) Chih Wei Liu 劉 志 尉 National Chiao Tung University [email protected].
Computer Architecture Lecture 2: Instruction Set Principles (Appendix A) Chih Wei Liu 劉 志 尉 National Chiao Tung University [email protected] Review Computers in mid 50 s Hardware was expensive
POSIX. RTOSes Part I. POSIX Versions. POSIX Versions (2)
RTOSes Part I Christopher Kenna September 24, 2010 POSIX Portable Operating System for UnIX Application portability at source-code level POSIX Family formally known as IEEE 1003 Originally 17 separate
Running FileMaker Pro 5.0v3 on Windows 2000 Terminal Services
Running FileMaker Pro 5.0v3 on Windows 2000 Terminal Services 2000 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 www.filemaker.com FileMaker
