Feeds

Happy 40th birthday, Intel 4004!

The first of the bricks that built the IT world

Boost IT visibility and business value

You're either on the bus or you're off the bus

One major advance in the P6 architecture was the frontside bus. Before P6, interfaces between processors and the rest of the system were processor-specific. A true system bus, Pawlowski said, understands global addressability and not just processor I/O but system I/O, as well, and offers the opportunity to gang more than one processor and maintain cache coherency.

Intel 80486

Intel 486DX: 15MHz, 33MHz, or 50MHz; 1-micron and 0.8-micron processes (click to enlarge)

The P6's frontside bus used Gunning transceiver logic from Xerox, which was able to scale well and and continue to work as voltages declined. "We only thought it would last two generations, maybe two processor generations," Pawlowski said. Instead, it lasted for about a decade.

Another big step for the P6 architecture was out-of-order execution. "It had the reorder buffer," Pawlowski said. "It was able to look at more than three or four instructions at a time. Even if it could only decode and retire maybe three instructions at a time, it was able to have, potentially – gosh, if I remember right – I'm going to say 36 ... instructions that potentially could be in flight at any one time."

The P6's upgrades, he told us, helped that architecture achieve "performance improvements way above what we were getting with Pentium and the superscaler machine."

But perhaps the most radical – and radically effective – improvement in the P6 architecture, and one that helped out-of-order execution as well, was the translation of IA instructions into smaller, more granular micro-operations, or µops, which were more easily dispatched through the P6's out-of-order, superscalar architecture.

Intel Pentium

Intel Pentium: 60MHz or 66MHz, 0.8-micron process at introduction (click to enlarge)

As Pawlowski told us, "As I keep telling people today, 'We really do binary translation in hardware in these machines'." The beauty part of binary translation, he said, is that such binary translation to µops can work with different architectures while still keeping full IA compatibility.

"You've got the flexibility of changing the underlying machine," he said, and then rattled off some of those changes. "Every process generation and processor generation, we add better branch prediction, we may add different functional units like the trace cache that was added on Willamette [the first Pentium 4] ... larger vector units, adding a vector unit with AVX and then continuing to extend that, looking at ways to elide locks and make your locks faster but still maintain the semantics of locks because that's what programmers still use, but try to get the speed and limit the impact of contention so that we can just continually improve the processor performance."

All of those changes are more easily accomplished, Pawlowski said, in a processor that has full binary translation – and that's one of the things that the P6 brought to the party.

P6 lasted for three generations – the Pentium Pro, Pentium II, and Pentium III – but it was to make a comeback.

Securing Web Applications Made Simple and Scalable

Next page: Feeling the strain

More from The Register

next story
Say goodbye to the noughties: Yesterday’s hi-fi biz is BUSTED, bro
Are the days of floorstanders and separates numbered?
It's finally happened: Bloke builds BOFH-style goofing-off cattle prod
BZZZT: Slapper man seeks funds for jolt-a-slacker device
'Ribbed' for your pleasure: Jony Ive unveils NAKED IPHONE
All-glass mobe could herald the END of traditional cases
iWatch watch: Apple tags sales bod from luxury Swiss watch firm
TAG Heuer retail man pinched for wearables division
IBM's $3bn bet on next-gen computers: Carbon nanotubes, neuro chips
Big Blue exec tells El Reg what to keep an eye on
Acer cranks Chromebooks with Core i3 models
Two 1.7GHz cores should make running ThinApps rather easier
Military-grade bruiser: Getac F110 rugged tablet... is no iPad
Intel Core i5, 11.6 inches, tough as old boots Windows slab
BlackBerry knocks Google's KNOX LOCK PICK for Android
John Chen disses Samsung's security solution
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximizing your infrastructure through virtualization
Virtualization continues to be one of the most effective ways to consolidate, reduce cost, and make data centers more efficient.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.