Sistemas Operativos

Total Page:16

File Type:pdf, Size:1020Kb

Sistemas Operativos Repaso de Arquitectura y Organización Criterios de clasificación v.2013 William Stallings, Organización y Arquitectura de Computadores, 8ª ed, 2010 Andrew S. Tanenbaum, Organización de Computadoras, 4ª ed, 2000 John Hennessy – David Patterson Arquitectura de Computadores – Un enfoque cuantitativo (1ª ed, 1990, cap 1 a 5) (4ª ed, 2007, cap 1 & ap. B) http://electro.fisica.unlp.edu.ar/arq/ Arquitectura de Computadoras Contenido de la clase Introducción, repaso de Arquitectura I, bibliografía. Definición de Arquitectura de Computadoras. Prehistoria e historia de las computadoras. Clasificación según el repertorio de instrucciones. Clasificación según la organización. Clasificación según la tecnología. Clasificación según la aplicación. Objetivos de la materia. 2 Arquitectura de Computadoras Introducción COMPUTADORA Dispositivo electrónico, digital y programable, utilizado para el procesamiento y/o manipulación de información. Representación digital de la información. Sistemas numéricos posicionales en base 2. Operaciones aritméticas implementadas con lógica. Otros tipos de información. El programa almacenado. Arquitectura de von Neumann. Tipos de instrucciones. Codificación ISA. Organización mínima. Datapath (REG y ALU) + UC. Buses. Programas y algoritmos. Re-programabilidad vs. sistemas dedicados. Hardware vs. software. El ciclo de instrucción. Interrupciones. Sistema de entrada/salida. La jerarquía de memoria. Localidad. MMU. Cache. Programación de alto nivel y sistemas operativos. 3 Arquitectura de Computadoras Bibliografía básica Arq I STAL TANN NULL Introducción 1-2 1 1 Números A A-B 2 Sistemas digitales 8 3 3 Von Neumann y buses 3 2-3 4 Repertorio de instrucciones 9-10 4-5 5 Memoria 4-5 2 6 Entrada/salida 6 2 7 Sistemas operativos 7 6 8 Arquitectura II 11-16 8 9-10 4 Arquitectura de Computadoras Arquitectura II Diferentes formas de paralelismo PRIMERA PARTE: PARALELISMO DENTRO DEL PROCESADOR Arquitectura RISC, segmentación y sistema de caché Procesadores superescalares y VLIW DSP y GPU SEGUNDA PARTE: PARALELISMO ENTRE PROCESADORES Procesadores SIMD y Vectoriales Arquitecturas MIMD Clusters 5 Arquitectura de Computadoras Definición Diseño de computadoras LÓGICA (Software?) ISA (INSTRUCTION SET ARCHITECTURE): Diseño a nivel del lenguaje de máquina, visible para el programador o compilador. Repertorio de instrucciones, registros, tipo y tamaño de operandos, modos de direccionamiento. IMPLEMENTACIÓN (Hardware?) ORGANIZACIÓN: Estructura del bus, diseño CPU, sistema de memoria, cache, ciclo de instrucción. TECNOLOGÍA: Diseño lógico, integración, encapsulado, potencia. “La arquitectura de computadoras, como otras arquitecturas, es el arte de determinar las necesidades del usuario de una estructura y luego diseñarla para satisfacer dichas necesidades tan eficientemente como sea posible dentro de ciertas limitaciones económicas y tecnológicas.” Frederick P. Brooks, IBM, 1962. 6 Ejemplos Aplicación de procesamiento de señales: La ARQUITECTURA, dispone de MAC, MUL o nada? (ISA); cuántos ciclos demora? (ORG); cuál es la frecuencia de trabajo/consumo de potencia? (TEC). Procesadores Intel Dos procesadores con idéntica ISA pero diferente ORG: Celeron y Celeron D. Dos procesadores con idénticas ISA y ORG, pero diferente tecnología: Celeron 1GHz y Celeron 2.8GHz. Dos procesadores con diferentes ISA, ORG y Tecnología: Celeron e Itanium. ERROR COMÚN Suponer que dos procesadores con idéntica ISA se pueden comparar por su reloj OTROS EJEMPLOS Computadora óptica (cambiando Tec puedo mantener la ISA y ORG) Computadora analógica (cambia ORG) Computadora vectorial (cambia ISA y ORG) 7 Arquitectura de Computadoras Prehistoria: arq de 8/16 bits 4004 (4-bit 640B) 1971 8008 (8-bit 16KB) 1972 8080 (8-bit 64KB) 1972 6800 (8-bit 64KB) 1973 8086 (16-bit 16MB) 1978 68000 (16/32-bit 16MB) 1979 8088 (8/16-bit) 1980 68008 (8/16-bit) 1982 IBM PC Apple II/Mac Personal Computer 8 Arquitectura de Computadoras Historia: arq de 32 bits Después de 30 años de existencia de las computadoras y 10 de los microprocesadores [Null, Cap 1], se produce un renacimiento de la Arquitectura en la década del 80, principalmente por dos motivos: LENGUAJES DE ALTO NIVEL: Desaparece la programación en assembler, por lo tanto no es necesaria la compatibilidad de código objeto. SISTEMAS OPERATIVOS: Se reducen el costo y el riesgo de lanzar al mercado una nueva arquitectura. Nacimiento de las nuevas Arquitecturas RISC: − ILP (pipeline + superescalares) − CACHE Crecimiento sostenido durante 20 años (ley de Moore) 9 Número de transistores por integrado. Duplica cada dos años, crecimiento exponencial sostenido. 10 Capacidad de los discos rígidos para PC (en GB) Crecimiento exponencial sostenido. 11 Performance relativa a VAX-11 (1978) Crecimiento exponencial sostenido (1986-2002). Luego desaceleración (a pesar de que tanto la densidad de transistores como el resto de las tecnologías acompañaron). El aumento del número de transistores no repercute directamente en la performance.12 Depende de los avances en ARQUITECTURA, tanto en hardware como en software. Arquitectura de Computadoras Clasificaciones Según la arquitectura del repertorio de instrucciones (ISA) Según la organización Según la tecnología Según la aplicación 13 Arquitectura de Computadoras Clasificación a nivel lenguaje de máquina (ISA) 1. Clase: Número y almacenamiento de operandos. Además de memoria, dónde? Utilización de registros. 2. Direccionamiento de memoria. Byte ordering (endianness). Alineación. 3. Modos de direccionamiento. Cantidad. Puede cualquiera de los operandos estar en memoria? 4. Tipo y tamaño de los operandos. ORTOGONALIDAD Todos los modos de direccionamiento y todos los tipos de datos disponibles 5. Tipos y variedad de operaciones. para todas las instrucciones. Gran ventaja para los compiladores. 6. Control de flujo. 7. Codificación del repertorio de instrucciones. 8. Interrupciones y modos privilegiados (user, supervisor,protected).14 Clasificación a nivel lenguaje de máquina Almacenamiento de operandos Add A,B,C 15 TAXONOMÍA DE PATTERSON: PILA, ACC, R-M, R-R, M-M Clasificación a nivel lenguaje de máquina Número de operandos 16 17 EJEMPLO: Velocidad vs. Densidad de código Analizaremos el impacto de dos problemas diferentes: M3 = M1 + M2 Suma de dos enteros Bn = (An + An-1)/2 Filtro en punto fijo Sobre tres arquitecturas diferentes: MM Arquitectura Memoria-Memoria RM Arquitectura Registro-Memoria RR Arquitectura Registro-Registro 18 M3 = M1 + M2 MM ADD M1,M2,M3 9c F-D-CO1-TR1-C02-TR2-E-CO3-TR3 = 9c RM LOAD R1,M1 (4c) LOAD: F-D-CO-TR = 4c 13c ADD R1,M2 (5c) ADD: F-D-CO-TR-E = 5c STORE R1,M3 (4c) RR LOAD R1,M1 (4c) LOAD R2,M2 (4c) 15c LOAD: F-D-CO-TR = 4c ADD: F-D-E = 3c ADD R1,R2,R3 (3c) STORE R3,M3 (4c) 19 M3 = M1 + M2 Bn = (An + An-1)/2 MM MM ADD An,An-1,Bn ADD M1,M2,M3 9c 18c DIV Bn,#2,Bn F-D-CO1-TR1-C02-TR2-E-CO3-TR3 = 9c RM RM LOAD R1,M1 (4c) 13c LOAD R1,An-1 (4c) 18c ADD R1,M2 (5c) ADD R1,An (5c) STORE R1,M3 (4c) DIV R1,#2 (5c) STORE R1,Bn (4c) LOAD: F-D-CO-TR = 4c ADD: F-D-CO-TR-E = 5c RR RR LOAD R1,M1 (4c) LOAD R1,An (4c) 15c 17c LOAD R2,M2 (4c) ADD R1,R2,R3 (3c) ADD R1,R2,R3 (3c) DIV R3,#2,R3 (3c) STORE R3,M3 (4c) STORE R3,Bn (4c) LOAD: F-D-CO-TR = 4c ADD R1,#0,R2 (3c) 20 ADD: F-D-E = 3c M3 = M1 + M2 Bn = (An + An-1)/2 MM MM ADD An,An-1,Bn ADD M1,M2,M3 9c 18c 1 DIV Bn,#2,Bn 1 F-D-CO1-TR1-C02-TR2-E-CO3-TR3 = 9c RM RM LOAD R1,M1 (4c) 13c LOAD R1,An-1 (4c) 18c ADD R1,M2 (5c) ADD R1,An (5c) STORE R1,M3 (4c) 3 DIV R1,#2 (5c) STORE R1,Bn (4c) LOAD: F-D-CO-TR = 4c 2 ADD: F-D-CO-TR-E = 5c RR RR LOAD R1,M1 (4c) LOAD R1,An (4c) 15c 17c LOAD R2,M2 (4c) ADD R1,R2,R3 (3c) ADD R1,R2,R3 (3c) DIV R3,#2,R3 (3c) 4 STORE R3,M3 (4c) STORE R3,Bn (4c) 2.5 LOAD: F-D-CO-TR = 4c ADD R1,#0,R2 (3c) 21 ADD: F-D-E = 3c Clasificación a nivel lenguaje de máquina Modos de direccionamiento 22 Clasificación a nivel lenguaje de máquina Repertorio de instrucciones Todas las arquitecturas disponen de un repertorio compuesto al menos por las tres primeras categorías. 23 Clasificación a nivel lenguaje de máquina Tipo y tamaño de operandos Arquitecturas con operandos de 8, 16, 32 o 64 bits. Operandos enteros y/o punto flotante (simple y doble precisión). RISC vs CISC (largo fijo vs. variable) CODIFICACIÓN DEL SET DE INSTRUCCIONES Tamaño de los programas Implementación del procesador (ORG+TECH) 24 Arquitectura de Computadoras Clasificación según la organización Estructura interna de la CPU La unidad de control (microprogramada vs. cableada) El camino de los datos (Datapath = Registros + ALU) El ciclo de instrucción, segmentación Escalaridad Cache de datos e instrucciones CPI, latencia Productividad (throughput) … PARALELISMO ... 25 Clasificación según la organización CU & Datapath 26 Clasificación según la organización Registros Para llevar a cabo el ciclo de instrucción (CAPTACION- DECODIFICACION-EJECUCION-INTERRUPCION) la CPU necesita registros de almacenamiento temporario. Registros visibles a) Usos generales: pueden utilizarse en cualquier operación. b) Uso específico: para datos o direcciones (ej. puntero de segmento). Registros de control PC (puntero), IR (instrucción), MAR (dirección) y MBR (datos) Registros de estado PSW (program status word) 27 Clasificación según la organización El ciclo de instrucción CAPTACION DE MEMORIA CAPTACION DE F LA INSTRUCCION LA INSTRUCCION UC DECODIFICACION D DECODIFICACION CALCULO DIR ALU CALCULO DIR CO DEL OPERANDO DEL OPERANDO CAPTACION DEL MEMORIA CAPTACION DEL FO OPERANDO OPERANDO EJECUCION DE ALU EJECUCION DE LA INSTRUCCION E LA INSTRUCCION 28 Arquitectura de Computadoras Clasificación según la TECNOLOGÍA Tecnologías que condicionan el diseño de la ISA: Circuitos integrados (densidad de transistores 55%/año) DRAM semiconductora (densidad celdas 40-60%/año) Discos magnéticos (capacidad 100%/año) Networking (ancho de banda 100%/año) La ISA debe sobrevivir a lo largo de ciclos de 5 años (2 de diseño + 3-2 de producción).
Recommended publications
  • Video Games: Changing the Way We Think of Home Entertainment
    Rochester Institute of Technology RIT Scholar Works Theses 2005 Video games: Changing the way we think of home entertainment Eri Shulga Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Shulga, Eri, "Video games: Changing the way we think of home entertainment" (2005). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Video Games: Changing The Way We Think Of Home Entertainment by Eri Shulga Thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Information Technology Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Copyright 2005 Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Master of Science in Information Technology Thesis Approval Form Student Name: _ __;E=.;r....;...i S=-h;....;..;u;;;..;..lg;;i..;:a;;...__ _____ Thesis Title: Video Games: Changing the Way We Think of Home Entertainment Thesis Committee Name Signature Date Evelyn Rozanski, Ph.D Evelyn Rozanski /o-/d-os- Chair Prof. Andy Phelps Andrew Phelps Committee Member Anne Haake, Ph.D Anne R. Haake Committee Member Thesis Reproduction Permission Form Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Master of Science in Information Technology Video Games: Changing the Way We Think Of Home Entertainment L Eri Shulga. hereby grant permission to the Wallace Library of the Rochester Institute of Technofogy to reproduce my thesis in whole or in part.
    [Show full text]
  • Openbsd Gaming Resource
    OPENBSD GAMING RESOURCE A continually updated resource for playing video games on OpenBSD. Mr. Satterly Updated August 7, 2021 P11U17A3B8 III Title: OpenBSD Gaming Resource Author: Mr. Satterly Publisher: Mr. Satterly Date: Updated August 7, 2021 Copyright: Creative Commons Zero 1.0 Universal Email: [email protected] Website: https://MrSatterly.com/ Contents 1 Introduction1 2 Ways to play the games2 2.1 Base system........................ 2 2.2 Ports/Editors........................ 3 2.3 Ports/Emulators...................... 3 Arcade emulation..................... 4 Computer emulation................... 4 Game console emulation................. 4 Operating system emulation .............. 7 2.4 Ports/Games........................ 8 Game engines....................... 8 Interactive fiction..................... 9 2.5 Ports/Math......................... 10 2.6 Ports/Net.......................... 10 2.7 Ports/Shells ........................ 12 2.8 Ports/WWW ........................ 12 3 Notable games 14 3.1 Free games ........................ 14 A-I.............................. 14 J-R.............................. 22 S-Z.............................. 26 3.2 Non-free games...................... 31 4 Getting the games 33 4.1 Games............................ 33 5 Former ways to play games 37 6 What next? 38 Appendices 39 A Clones, models, and variants 39 Index 51 IV 1 Introduction I use this document to help organize my thoughts, files, and links on how to play games on OpenBSD. It helps me to remember what I have gone through while finding new games. The biggest reason to read or at least skim this document is because how can you search for something you do not know exists? I will show you ways to play games, what free and non-free games are available, and give links to help you get started on downloading them.
    [Show full text]
  • Integrating Formal Verification Into an Advanced Computer Architecture Course
    Session 1532 Integrating Formal Verification into an Advanced Computer Architecture Course Miroslav N. Velev [email protected] School of Electrical and Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332, U.S.A. Abstract. The paper presents a sequence of three projects on design and formal verification of pipelined and superscalar processors. The projects were integrated—by means of lectures and pre- paratory homework exercises—into an existing advanced computer architecture course taught to both undergraduate and graduate students in a way that required them to have no prior knowledge of formal methods. The first project was on design and formal verification of a 5-stage pipelined DLX processor, implementing the six basic instruction types—register-register-ALU, register- immediate-ALU, store, load, jump, and branch. The second project was on extending the processor from project one with ALU exceptions, a return-from-exception instruction, and branch prediction; each of the resulting models was formally verified. The third project was on design and formal ver- ification of a dual-issue superscalar version of the DLX from project one. The preparatory home- work problems included an exercise on design and formal verification of a staggered ALU, pipelined in the style of the integer ALUs in the Intel Pentium 4. The processors were described in the high-level hardware description language AbsHDL that allows the students to ignore the bit widths of word-level values and the internal implementations of functional units and memories, while focusing entirely on the logic that controls the pipelined or superscalar execution. The formal verification tool flow included the term-level symbolic simulator TLSim, the decision procedure EVC, and an efficient SAT-checker; this tool flow—combined with the same abstraction techniques for defining processors with exceptions and branch prediction, as used in the projects—was applied at Motorola to formally verify a model of the M•CORE processor, and detected bugs.
    [Show full text]
  • IBM Gekko RISC Microprocessor User's Manual
    IBM Gekko RISC Microprocessor User’s Manual Version 1.2 May 25, 2000 IBM Confidential Trademarks The following are trademarks of International Business Machines Corporation in the United States, or other countries, or both: IBM IBM Logo PowerPC AIX PowerPC 750 Gekko Other company, product, and service names may be trademarks or service marks of others. Document History Date Description Preliminary Edition 3/29/00 Initial release of new format 2nd Preliminary Edition 4/18/00 Minor changes, most are transparent to user (removal of conditional text, etc.) 3rd Preliminary Edition 5/25/00 Minor change in section 4.5.6 This unpublished document is the preliminary edition of IBM Gekko RISC Microprocessor User’s Manual. This document contains information on a new product under development by IBM. IBM reserves the right to change or discontinue this product without notice. © 2000 International Business Machines Corporation . All rights reserved. CONTENTS Chapter 1 Gekko Overview 1.1—Gekko Microprocessor Overview - - - - - - - - - - - - - - - - - - - - - - - 1-1 1.2—Gekko Microprocessor Features - - - - - - - - - - - - - - - - - - - - - - - - 1-4 1.2.1—Overview of Gekko Microprocessor Features - - - - - - - - - 1-4 1.2.2—Instruction Flow - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1-6 1.2.2.1—Instruction Queue and Dispatch Unit - - - - - - - - 1-7 1.2.2.2—Branch Processing Unit (BPU) - - - - - - - - - - - - 1-7 1.2.2.3—Completion Unit - - - - - - - - - - - - - - - - - - - - - - 1-8 1.2.2.4—Independent Execution Units- - - - - - - -
    [Show full text]
  • 佐野正博(2010)「Cpu モジュール単体の性能指標としての Ips 値」2010 年度技術戦略論用資料
    佐野正博(2010)「CPU モジュール単体の性能指標としての IPS 値」2010 年度技術戦略論用資料 CPU モジュール単体の性能指標としての IPS 値 ............. .. CPU モジュール単体の性能を測る指標の一つは、「1秒間に何個の命令(Instructions)を実行可能であるのか」ということ である。そのための基本的単位は IPS(Instructions Per Second)である。代表的な CPU の IPS 値は下表の通りである。 ゲーム専用機用 CPU と PC 用 CPU、ゲーム専用機用 CPU でも据え置き型ゲーム専用機用 CPU と携帯型ゲーム専用 機用 CPU との区別に注意を払って下記の一覧表を見ると、CPU の MIPS 値は当然のことながら年ごとに性能を着実に向 上させていることがわかる。 IPS(Instructions Per Second)値の比較表 —- 年順 (命令実行性能の単位は MIPS、動作周波数の単位は MHz) 命令実行 動作 プロセッサーの名称 年 性能 周波数 Intel 4004 0.09 0.74 1971 Intel 8080 0.64 2 1974 セガ:メガドライブ/Motorola 68000 1 8 1979 Intel 80286 2.66 12 1982 Motorola 68030 11 33 1987 Intel 80386DX 8.5 25 1988 NEC:PC-FX/NEC V810 16 25 1994 Motorola 68040 44 40 1990 Intel 80486DX 54 66 1992 セガ:セガサターン/日立 SH-2 25 28.6 1994 SONY:PS/MIPS R3000A 30 34 1994 任天堂:N64/MIPS R4300 125 93.75 1996 Intel Pentium Pro 541 200 1996 PowerPC G3 525 233 1997 セガ:Dreamcast/日立 SH-4 360 200 1998 Intel Pentium III 1,354 500 1999 SONY:PS2 [Emotion Engine]/MIPS IV(R5900) 435 300 2000 任天堂:GAMECUBE [Gekko]/IBM PowerPC G3 (1) 1,125 485 2001 MICROSOFT:XBOX/Intel Mobile Celeron(Pentium III) 1,985 733 2001 (推定値) 任天堂:ゲームボーイアドバンス/ARM ARM7TDMI 15 16.8 2001 Pentium 4 Extreme Edition 9,726 3,200 2003 任天堂:ニンテンドーDS/ARM ARM946E-S 74.5 67 2004 MICROSOFT:XBOX360 [Xenon]/IBM PowerPC G5 6,400 3,200 2005 任天堂:Wii [BroadWay]/IBM PowerPC G3 2,250 729 2006 SONY:PS3[Cell 内蔵 PPE]/IBM PowerPC G5 10,240 3,200 2006 Intel Core 2 Extreme QX6700 49,161 2,660 2006 [出典]文書末の注で明示したものを除き、"Instructions per second", Wikipedia, http://en.wikipedia.org/wiki/Instructions_per_second, (2008
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]
  • Premiere Issue Monkeying Around Game Reviews: Special Report
    Atari Coleco Intellivision Computers Vectrex Arcade ClassicClassic GamerGamer Premiere Issue MagazineMagazine Fall 1999 www.classicgamer.com U.S. “Because Newer Isn’t Necessarily Better!” Special Report: Classic Videogames at E3 Monkeying Around Revisiting Donkey Kong Game Reviews: Atari, Intellivision, etc... Lost Arcade Classic: Warp Warp Deep Thaw Chris Lion Rediscovers His Atari Plus! · Latest News · Guide to Halloween Games · Win the book, “Phoenix” “As long as you enjoy the system you own and the software made for it, there’s no reason to mothball your equipment just because its manufacturer’s stock dropped.” - Arnie Katz, Editor of Electronic Games Magazine, 1984 Classic Gamer Magazine Fall 1999 3 Volume 1, Version 1.2 Fall 1999 PUBLISHER/EDITOR-IN-CHIEF Chris Cavanaugh - [email protected] ASSOCIATE EDITOR Sarah Thomas - [email protected] STAFF WRITERS Kyle Snyder- [email protected] Reset! 5 Chris Lion - [email protected] Patrick Wong - [email protected] Raves ‘N Rants — Letters from our readers 6 Darryl Guenther - [email protected] Mike Genova - [email protected] Classic Gamer Newswire — All the latest news 8 Damien Quicksilver [email protected] Frank Traut - [email protected] Lee Seitz - [email protected] Book Bytes - Joystick Nation 12 LAYOUT/DESIGN Classic Advertisement — Arcadia Supercharger 14 Chris Cavanaugh PHOTO CREDITS Atari 5200 15 Sarah Thomas - Staff Photographer Pong Machine scan (page 3) courtesy The “New” Classic Gamer — Opinion Column 16 Sean Kelly - Digital Press CD-ROM BIRA BIRA Photos courtesy Robert Batina Lost Arcade Classics — ”Warp Warp” 17 CONTACT INFORMATION Classic Gamer Magazine Focus on Intellivision Cartridge Reviews 18 7770 Regents Road #113-293 San Diego, Ca 92122 Doin’ The Donkey Kong — A closer look at our 20 e-mail: [email protected] on the web: favorite monkey http://www.classicgamer.com Atari 2600 Cartridge Reviews 23 SPECIAL THANKS To Sarah.
    [Show full text]
  • PA Build RM.Pdf
    CodeWarrior Development Studio for Power Architecture® Processors Build Tools Reference Revised: 2 March 2012 Freescale, the Freescale logo and CodeWarrior are trademarks of Freescale Semiconductor, Inc., Reg. U.S. Pat. & Tm. Off. The Power Architecture and Power.org word marks and the Power and Power.org logos and related marks are trademarks and service marks licensed by Power.org. All other product or service names are the property of their re- spective owners. © 2005-2012 Freescale Semiconductor, Inc. All rights reserved. Information in this document is provided solely to enable system and software implementers to use Freescale Semicon- ductor products. There are no express or implied copyright licenses granted hereunder to design or fabricate any inte- grated circuits or integrated circuits based on the information in this document. Freescale Semiconductor reserves the right to make changes without further notice to any products herein. Freescale Semiconductor makes no warranty, representation or guarantee regarding the suitability of its products for any partic- ular purpose, nor does Freescale Semiconductor assume any liability arising out of the application or use of any product or circuit, and specifically disclaims any and all liability, including without limitation consequential or incidental dam- ages. “Typical” parameters that may be provided in Freescale Semiconductor data sheets and/or specifications can and do vary in different applications and actual performance may vary over time. All operating parameters, including
    [Show full text]
  • Oral History of Phil Gossett
    Oral History of Phil Gossett Interviewed by: John Mashey Recorded June 17, 2019 Mountain View, CA CHM Reference number: X9077.2019 © 2019 Computer History Museum Oral History of Phil Gossett Mashey: Okay. So why don’t we start with where you grew up and, you know, how you got into computing, and is that what you thought you were going to do and that sort? Gossett: Right. So I grew up in New York City. My father was a professional cinematographer, mostly doing TV news. So he sort of specialized in riots in the New York area, late ‘60s. So if you’ve seen any riots in New York you’ve probably seen his work. Mashey: Oh, great. <laughter> Gossett: My mother was a American History teacher in a high school, and she passed away when I was nine, so I, you know, that was a bummer, but anyway, I was, you know, a geek, a nerd, for as long as I can remember. I was raised as a Roman Catholic but it didn’t take. You know, I immediately saw that, you know, I wasn’t buying any of it, okay, so science was my thing. I originally wanted to be a physicist, you know, theoretical physicist, but when I went to undergraduate MIT, it became pretty obvious that it was impossible to do physics and eat, and, you know, I’m not into starvation or living on the streets or whatever. So that was, you know, fairly early in the days of popular computing. I guess the Apple II had just come out.
    [Show full text]
  • Ilore: Discovering a Lineage of Microprocessors
    iLORE: Discovering a Lineage of Microprocessors Samuel Lewis Furman Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements for the degree of Master of Science in Computer Science & Applications Kirk Cameron, Chair Godmar Back Margaret Ellis May 24, 2021 Blacksburg, Virginia Keywords: Computer history, systems, computer architecture, microprocessors Copyright 2021, Samuel Lewis Furman iLORE: Discovering a Lineage of Microprocessors Samuel Lewis Furman (ABSTRACT) Researchers, benchmarking organizations, and hardware manufacturers maintain repositories of computer component and performance information. However, this data is split across many isolated sources and is stored in a form that is not conducive to analysis. A centralized repository of said data would arm stakeholders across industry and academia with a tool to more quantitatively understand the history of computing. We propose iLORE, a data model designed to represent intricate relationships between computer system benchmarks and computer components. We detail the methods we used to implement and populate the iLORE data model using data harvested from publicly available sources. Finally, we demonstrate the validity and utility of our iLORE implementation through an analysis of the characteristics and lineage of commercial microprocessors. We encourage the research community to interact with our data and visualizations at csgenome.org. iLORE: Discovering a Lineage of Microprocessors Samuel Lewis Furman (GENERAL AUDIENCE ABSTRACT) Researchers, benchmarking organizations, and hardware manufacturers maintain repositories of computer component and performance information. However, this data is split across many isolated sources and is stored in a form that is not conducive to analysis. A centralized repository of said data would arm stakeholders across industry and academia with a tool to more quantitatively understand the history of computing.
    [Show full text]
  • Revolution Build System Revolution SDK
    Revolution Build System Version 1.03 The contents in this document are highly confidential and should be handled accordingly. © 2006-2007 Nintendo RVL-06-0044-001-E CONFIDENTIAL Released: October 22, 2007 Revolution Build System Revolution SDK Confidential These coded instructions, st atements , and computer programs contain proprieta ry information of Nintendo of America Inc. and/or Nintendo Company Ltd. and are protected by Federal copyright law. They may not be disclosed to third parties or copied or duplicated in any form, in whole or in part, without the prior written consent of Nintendo. RVL-06-0044-001-E 2 © 2006-2007 Nintendo Released: October 22, 2007 CONFIDENTIAL Revolution SDK Revolution Build System Contents 1 Overview ................................................................................................................................ ....... 6 2 Assumptions ................................................................................................................................ .7 3 Running Demos ............................................................................................................................ 8 3.1 Initializing the Revolution Shell ........................................................................................... 8 3.2 Running a Demo from the Command Line ......................................................................... 8 3.3 Running a Demo from the Debugger .................................................................................. 8 4 Building a Sample
    [Show full text]
  • “Gamecube Hacking”
    “Gamecube Hacking” 1. Gamecube Hardware - what you can read everywhere 2. Gamecube Hardware - a bit more details 3. Homebrew - how to get your code to the cube 4. The boot process (and how to hack it) 5. Working around the encryption... 6. The ROM emulation hardware 7. Homebrew stuff 8. Linux 27th December 2004 Gamecube Hacking Page 1 1 – Gamecube Hardware– Gamecube Hardware • Codenamed “Dolphin” • Release: Japan: 2001-09-14, USA: 2002-03-03 • Marketing guys say: “128-bit console” • Initial price: $199, now as cheap as 99 27th December 2004 Gamecube Hacking Page 2 1 – Gamecube Hardware– • Built around “Gekko”-CPU (PowerPC) at 486MHz • External CPU bus: 64bit @ 162MHz, gives 1.3GB/s to the marketing guys • 32kB instruction cache, 32kB 8-way data cache • 256kB 2-way second level cache 27th December 2004 Gamecube Hacking Page 3 1 – Gamecube Hardware– • Custom GPU called “Flipper”, made by ArtX Inc. (now ATi) • 2.1MB embedded framebuffer memory • 1MB high-speed texture cache • GPU supports the usual 3D features 27th December 2004 Gamecube Hacking Page 4 1 – Gamecube Hardware– • Storage Medium: proprietary 7.5cm (mini-)DVD-based discs • Of course copy protected ;) • 1.2GB per disc 27th December 2004 Gamecube Hacking Page 5 1 – Gamecube Hardware– • External interfaces are proprietary: • 4 “serial” controllers (N64-compatible) • 2 memory card slots, 2 “serial” ports (SPI-like) (EXI BUS) 27th December 2004 Gamecube Hacking Page 6 2 – Hardware - More Details– Hardware - More Details 486 MHz Gekko PowerPC PowerPC−styled Boot ROM / RTC bus interface 162MHz 64bit Broadband Adapter SPI−like 27MHz max. Flipper Memory Cards Controller Interface EXI serial ..
    [Show full text]