• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Hardware Secrets

Hardware Secrets

Uncomplicating the complicated

  • Case
  • Cooling
  • Memory
  • Mobile
    • Laptops
    • Smartphones
    • Tablets
  • Motherboard
  • Networking
  • Other
    • Audio
    • Cameras
    • Consumer Electronics
    • Desktops
    • Museum
    • Software
    • Tradeshows & Events
  • Peripherals
    • Headset
    • Keyboard
    • Mouse
    • Printers
  • Power
  • Storage
  • Video

Intel 64-bit architecture (IA-64)

Learn in depth how the Intel IA-64 architecture works.

Home » Intel 64-bit architecture (IA-64)

Introduction: VLIW

Contents

  • 1. Introduction: VLIW
  • 2. IA-64 Architecture
  • 3. IA-32 Compability
  • 4. Conclusion

Since 1994, Intel and HP work at a 64-bit option. Its architecture should enable the CISC processors to take a big enough step to overtake the RISC processors. By using a technique called VLIW, still experimental at the time, and creating the EPIC model, they proposed the Merced architecture, which has been promised to the beginning of the year 2000. As things have changed, the processors Pentium III and IV and the Athlon have offered exceptional performance, reaching over 1 GHz, and because of this new architecture’s high price and the low availability of programs to 64 bits, the timetable has been delayed and the release of the IA-64 architecture should happen only this year.

The letters VLIW mean Very Large Instruction Word. Processors that use this technique access the memory by transferring long program words, and in each word many instructions are packed. In the case of the IA-64, three instructions are used for each pack of 128 bits. As each instruction has 41 bits, there are 5 bits left that will be used to indicate the kinds of instruction that were packed. Figure 1 shows the instruction packaging scheme. This packaging lessens the number of memory accesses, leaving to the compiler the task of grouping the instructions in order to get the best of the architecture.

IA-64Figure 1: Instruction packaging used in the IA-64 architecture.

As it has already been said, the 5-bit field, named as pointer, serves to indicate the kinds of instructions that are packed. Those 5 bits offer 32 kinds of packaging possible that, in fact, are reduced to 24 kinds, since 8 are not used. Each instruction uses one of the CPU features, which are listed below, and that can be identified in Figure 2 (on next page):

  • I Unit: integer data;
  • F Unit: floating-point operations;
  • M Unit: memory access; and
  • B Unit: branch prediction.
Continue: IA-64 Architecture

CPU Articles

Primary Sidebar

As a participant in the Amazon Services LLC Associates Program, this site may earn from qualifying purchases. We may also earn commissions on purchases from other retail websites.

How to Avoid Scams on Facebook Marketplace Once and For All

Social media scams generate more than 770 million US dollars in losses in the US alone, and it’s … [Read More...] about How to Avoid Scams on Facebook Marketplace Once and For All

AMD EPYC from Zen1 to Zen4. How it will change the CPU market?

AMD, together with Intel, is one of the major processor manufacturers known in today's market. … [Read More...] about AMD EPYC from Zen1 to Zen4. How it will change the CPU market?

Valorant Phoenix Tips & Tricks You Have to Know

The Phoenix character in Valorant is one of the most amazing to play. Being aggressive, Phoenix will … [Read More...] about Valorant Phoenix Tips & Tricks You Have to Know

Footer

For Performance

  • About
  • Contact
  • Articles
  • Editorials
  • First Look
  • Reviews
  • Tutorials
  • Privacy

Everything you need to know

  • Everything You Need to Know About the Dual-, Triple-, and Quad-Channel Memory Architectures
  • What You Should Know About the SPDIF Connection (2022 Guide)
  • Everything You Need to Know About the Intel Virtualization Technology
  • Everything You Need to Know About the CPU Power Management

Copyright © 2023 · All rights reserved - Hardwaresecrets.com
About Us · Privacy Policy · Contact