SlideShare une entreprise Scribd logo
CONTENTS
o OBJECTIVE
o INTRODUCTION
o EXISTING METHOD
o PROPOSED METHOD
o METHODOLOGY
o RISC PROCESSOR DESIGN
o CONTROL UNIT ASM CHART
o RESULTS
o ADVANTAGES
o APPLICATIONS
o CONCLUSION
o FUTURE SCOPE
o REFERENCES
OBJECTIVE
o The 16-bit RISC Processor is designed to execute computing tasks with the
simplest instructions in the shortest amount of time possible.
o The design and implementation of a 4-stage pipelining is based on low power
processor. Low power was obtained by using Clock Gating Technique.
INTRODUCTION
o Based on the Speed and Performance the Microprocessors and Microcontrollers are
designed under two categories
1. RISC (Reduced Instruction Set of Computers )
2. CISC (Complex Instruction of Computers)
o RISC architecture has high power efficiency which is used in portable applications.
o CISC instructions execute more complex instructions all at once upon memory.
EXISTING METHOD
o RISC CPU architecture has been designed at higher technological nodes like
250nm,180nm,90nm.
o To reduce power dissipation and increase speed of operation, still there is a need
to design RISC CPU at advanced technological nodes.
PROPOSED METHOD
o In VLSI, enhancement can be made in two ways. That are
1.Technological advancement.
2.Architectural advancement.
o Now by incorporating the instruction set, the RISC processor is designed at 45nm
technology.
METHODOLOGY
Literature Survey and Problem Statement
Required Specifications of RISC processor
Defining Objectives
Select desired topology/Architecture
Derive Suitable Parameter Values
Designing and Simulation
Meet the
required
Specifications
Specifications are met
Implementation
Optimization Techniques
RISC pipeline stages and meaning
Pipeline stage Meaning
Fetch CPU receives instruction
Decode CPU understands instruction
Execute CPU performs computation
Access CPU access required data from registers or
memory
Write back CPU stores result to registers or memory
INSTRUCTION SET
1. Arithmetic( Two’s Complement)ALU OPERATION : ADD, SUB
2. Logical ALU Operations : AND, OR, XOR, NOT, SLA, SRA
3. Memory Operations : LI, LW, SW
4. Conditional Branch Operations : BIZ, BINZ
5. Program Count Jump Operations : JAL, JMP, JR
RISC PROCESSOR DESIGN
CONTROL UNIT
o Program Counter :The program counter stores the program(s) that the processor is running and
will run in the future.
o Instruction Register :The Instruction Register (IR) stores the current instruction, not the memory
location. It’s main purpose is to provide information about the instruction to the Control Unit.
o Controller :The controller is the main operator in the design. It sends control signals to both the
Data path and Memory units to execute the instruction.
MEMORY UNIT
o 2:1 8-BIT MUX 21 : The main function of the MUX is to select the input address of the Memory
submodule with the PC_addr from the PC or D_addr from the Control Unit. The Control Unit selects
the output of the MUX with D_addr_sel.
o 256x16-BIT MAIN MEMORY : This submodule contains the RISC Processor’s onboard memory.
With 256 rows, the 16-bit memory takes in an 8-bit address to select the address space. It receives two
control signals, D_rd and D_wr, for reading and writing operations respectively.
DATA PATH UNIT
o 3:1 16-BIT MUX : The MUX controls three different data lines into the Register Bank: the output from the ALU,
Memory from the Memory Bank, and the 8-bit immediate from the Control Unit.
o 16x16-BIT REGISTER BANK : The Register Bank consists of 16, 16-bit registers for general purpose. Given
the RISC processor’s “load-store” approach to memory access, the register bank is extensively used for all
instructions.
o 16-BIT ALU : The 16-bit ALU is tasked with applying a logical or arithmetic operation on two operands that
stem from the Register Bank.
o RF_RP_ZERO : The RF_rp_zero submodule serves as combinational circuit to check if the output Rp from the
Register Bank is zero.
16-BIT RISC PROCESSOR ARCHITECTURE
CONTROL UNIT ASM CHART
TOOLS USED
• SOFTWARE: CADENCE
• LANGUAGE: VERILOG HDL
Fig: Control signals for ten instructions
RESULTS
Fig: Memory and Data path Simulation
Fig: Instruction Register Simulation
ADVANTAGES
o Performance is good.
o Processor uses several transistors.
o Allows the instruction to utilize open space on a microprocessor.
o It is very simple as compared with another processor.
APPLICATIONS
o Video & Image Processing
o Instrumentation
o Super mini and CAD Machines
o Telecommunication
o Terminals
CONCLUSION
o A 16-bit RISC Processor has been implemented with Harvard architecture and
4-stage pipelining structure in one clock cycle.
o This design can be used for portable devices such as Laptops, Mobiles and
Tablets etc., The RISC architecture is simulated and synthesized using Cadence
RTL Compiler.
FUTURE SCOPE
o In future, this design bits may be increased up to 64-bits. We can compare those
RISC structures in various technology libraries like slow, fast and typical includes
different technologies so that can improve the area, power and delay of the
designs.
REFERENCES
o Rajesh Kumar B and Santha Kumar, "Implementation of a 16-Bit RISC Processor for Convolution
Application", Advanced in Electronic and Electric Engineering, vol. 4, pp. 441-446, 2014.
o Samiappa Sakthikumaran, S Salivahanan and V S Kanchana Baaskaran, "16-Bit RISC Processor
Design for Convolution Applications", IEEE- International Conference on Recent Trends in
Information Technology, pp. 394-397, Jun. 2011.
o Ramandeep Kaur and Anuj, "8-Bit RISC Processor using Verilog HDL", Anuj et al Int. Journal of
Engineering Research and Applications, vol. 4, pp. 417-422, Mar. 2014
Thank You

Contenu connexe

Similaire à DESIGN OF A 16-BIT HARVARD STRUCTURED RISC PROCESSOR IN CADENCE 45nmTECHNOLOGY

M&i(lec#01)
M&i(lec#01)M&i(lec#01)
M&i(lec#01)
Majid Mehmood
 
Arm processor
Arm processorArm processor
Arm processor
PrashantSingh056
 
An Enhanced FPGA Based Asynchronous Microprocessor Design Using VIVADO and ISIM
An Enhanced FPGA Based Asynchronous Microprocessor Design Using VIVADO and ISIMAn Enhanced FPGA Based Asynchronous Microprocessor Design Using VIVADO and ISIM
An Enhanced FPGA Based Asynchronous Microprocessor Design Using VIVADO and ISIM
journalBEEI
 
AN INTEGRATED FOUR-PORT DC-DC CONVERTER-CEI0080
AN INTEGRATED FOUR-PORT DC-DC CONVERTER-CEI0080AN INTEGRATED FOUR-PORT DC-DC CONVERTER-CEI0080
AN INTEGRATED FOUR-PORT DC-DC CONVERTER-CEI0080
Vivek Venugopal
 
PIC MICROCONTROLLERS -CLASS NOTES
PIC MICROCONTROLLERS -CLASS NOTESPIC MICROCONTROLLERS -CLASS NOTES
PIC MICROCONTROLLERS -CLASS NOTES
Dr.YNM
 
A REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORS
A REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORSA REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORS
A REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORS
IRJET Journal
 
My seminar new 28
My seminar new 28My seminar new 28
My seminar new 28
rajeshkvdn
 
Design of a low power processor for Embedded system applications
Design of a low power processor for Embedded system applicationsDesign of a low power processor for Embedded system applications
Design of a low power processor for Embedded system applications
ROHIT89352
 
Micro controller
Micro controllerMicro controller
Micro controller
Devi Prasad
 
16-bit Microprocessor Design (2005)
16-bit Microprocessor Design (2005)16-bit Microprocessor Design (2005)
16-bit Microprocessor Design (2005)
Susam Pal
 
Overview of Microcontroller and ATMega32 microcontroller
Overview of Microcontroller and ATMega32 microcontrollerOverview of Microcontroller and ATMega32 microcontroller
Overview of Microcontroller and ATMega32 microcontroller
Rup Chowdhury
 
L3 instruction-execution-steps
L3 instruction-execution-stepsL3 instruction-execution-steps
L3 instruction-execution-steps
rsamurti
 
Developing an avr microcontroller system
Developing an avr microcontroller systemDeveloping an avr microcontroller system
Developing an avr microcontroller system
nugnugmacmac
 
18CS44-MODULE1-PPT.pptx
18CS44-MODULE1-PPT.pptx18CS44-MODULE1-PPT.pptx
18CS44-MODULE1-PPT.pptx
KokilaK25
 
Microprocessor and Microcontroller Based Systems.ppt
Microprocessor and Microcontroller Based Systems.pptMicroprocessor and Microcontroller Based Systems.ppt
Microprocessor and Microcontroller Based Systems.ppt
TALHARIAZ46
 
Design_amp_analysis_of_16_bit_RISC_processor_using_low_power_pipelining.pdf
Design_amp_analysis_of_16_bit_RISC_processor_using_low_power_pipelining.pdfDesign_amp_analysis_of_16_bit_RISC_processor_using_low_power_pipelining.pdf
Design_amp_analysis_of_16_bit_RISC_processor_using_low_power_pipelining.pdf
ssuser1e1bab
 
Embedded system (Chapter 2) part A
Embedded system (Chapter 2) part AEmbedded system (Chapter 2) part A
Embedded system (Chapter 2) part A
Ikhwan_Fakrudin
 
Pic microcontroller architecture
Pic microcontroller architecturePic microcontroller architecture
Pic microcontroller architecture
Jamia Hamdard
 
unit 1ARM INTRODUCTION.pptx
unit 1ARM INTRODUCTION.pptxunit 1ARM INTRODUCTION.pptx
unit 1ARM INTRODUCTION.pptx
KandavelEee
 
Lecture 1 m&ca
Lecture 1 m&caLecture 1 m&ca
Lecture 1 m&ca
Tribhuvan University
 

Similaire à DESIGN OF A 16-BIT HARVARD STRUCTURED RISC PROCESSOR IN CADENCE 45nmTECHNOLOGY (20)

M&i(lec#01)
M&i(lec#01)M&i(lec#01)
M&i(lec#01)
 
Arm processor
Arm processorArm processor
Arm processor
 
An Enhanced FPGA Based Asynchronous Microprocessor Design Using VIVADO and ISIM
An Enhanced FPGA Based Asynchronous Microprocessor Design Using VIVADO and ISIMAn Enhanced FPGA Based Asynchronous Microprocessor Design Using VIVADO and ISIM
An Enhanced FPGA Based Asynchronous Microprocessor Design Using VIVADO and ISIM
 
AN INTEGRATED FOUR-PORT DC-DC CONVERTER-CEI0080
AN INTEGRATED FOUR-PORT DC-DC CONVERTER-CEI0080AN INTEGRATED FOUR-PORT DC-DC CONVERTER-CEI0080
AN INTEGRATED FOUR-PORT DC-DC CONVERTER-CEI0080
 
PIC MICROCONTROLLERS -CLASS NOTES
PIC MICROCONTROLLERS -CLASS NOTESPIC MICROCONTROLLERS -CLASS NOTES
PIC MICROCONTROLLERS -CLASS NOTES
 
A REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORS
A REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORSA REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORS
A REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORS
 
My seminar new 28
My seminar new 28My seminar new 28
My seminar new 28
 
Design of a low power processor for Embedded system applications
Design of a low power processor for Embedded system applicationsDesign of a low power processor for Embedded system applications
Design of a low power processor for Embedded system applications
 
Micro controller
Micro controllerMicro controller
Micro controller
 
16-bit Microprocessor Design (2005)
16-bit Microprocessor Design (2005)16-bit Microprocessor Design (2005)
16-bit Microprocessor Design (2005)
 
Overview of Microcontroller and ATMega32 microcontroller
Overview of Microcontroller and ATMega32 microcontrollerOverview of Microcontroller and ATMega32 microcontroller
Overview of Microcontroller and ATMega32 microcontroller
 
L3 instruction-execution-steps
L3 instruction-execution-stepsL3 instruction-execution-steps
L3 instruction-execution-steps
 
Developing an avr microcontroller system
Developing an avr microcontroller systemDeveloping an avr microcontroller system
Developing an avr microcontroller system
 
18CS44-MODULE1-PPT.pptx
18CS44-MODULE1-PPT.pptx18CS44-MODULE1-PPT.pptx
18CS44-MODULE1-PPT.pptx
 
Microprocessor and Microcontroller Based Systems.ppt
Microprocessor and Microcontroller Based Systems.pptMicroprocessor and Microcontroller Based Systems.ppt
Microprocessor and Microcontroller Based Systems.ppt
 
Design_amp_analysis_of_16_bit_RISC_processor_using_low_power_pipelining.pdf
Design_amp_analysis_of_16_bit_RISC_processor_using_low_power_pipelining.pdfDesign_amp_analysis_of_16_bit_RISC_processor_using_low_power_pipelining.pdf
Design_amp_analysis_of_16_bit_RISC_processor_using_low_power_pipelining.pdf
 
Embedded system (Chapter 2) part A
Embedded system (Chapter 2) part AEmbedded system (Chapter 2) part A
Embedded system (Chapter 2) part A
 
Pic microcontroller architecture
Pic microcontroller architecturePic microcontroller architecture
Pic microcontroller architecture
 
unit 1ARM INTRODUCTION.pptx
unit 1ARM INTRODUCTION.pptxunit 1ARM INTRODUCTION.pptx
unit 1ARM INTRODUCTION.pptx
 
Lecture 1 m&ca
Lecture 1 m&caLecture 1 m&ca
Lecture 1 m&ca
 

Dernier

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 

Dernier (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 

DESIGN OF A 16-BIT HARVARD STRUCTURED RISC PROCESSOR IN CADENCE 45nmTECHNOLOGY

  • 1. CONTENTS o OBJECTIVE o INTRODUCTION o EXISTING METHOD o PROPOSED METHOD o METHODOLOGY o RISC PROCESSOR DESIGN o CONTROL UNIT ASM CHART o RESULTS o ADVANTAGES o APPLICATIONS o CONCLUSION o FUTURE SCOPE o REFERENCES
  • 2. OBJECTIVE o The 16-bit RISC Processor is designed to execute computing tasks with the simplest instructions in the shortest amount of time possible. o The design and implementation of a 4-stage pipelining is based on low power processor. Low power was obtained by using Clock Gating Technique.
  • 3. INTRODUCTION o Based on the Speed and Performance the Microprocessors and Microcontrollers are designed under two categories 1. RISC (Reduced Instruction Set of Computers ) 2. CISC (Complex Instruction of Computers) o RISC architecture has high power efficiency which is used in portable applications. o CISC instructions execute more complex instructions all at once upon memory.
  • 4. EXISTING METHOD o RISC CPU architecture has been designed at higher technological nodes like 250nm,180nm,90nm. o To reduce power dissipation and increase speed of operation, still there is a need to design RISC CPU at advanced technological nodes.
  • 5. PROPOSED METHOD o In VLSI, enhancement can be made in two ways. That are 1.Technological advancement. 2.Architectural advancement. o Now by incorporating the instruction set, the RISC processor is designed at 45nm technology.
  • 6. METHODOLOGY Literature Survey and Problem Statement Required Specifications of RISC processor Defining Objectives Select desired topology/Architecture Derive Suitable Parameter Values Designing and Simulation Meet the required Specifications Specifications are met Implementation Optimization Techniques
  • 7. RISC pipeline stages and meaning Pipeline stage Meaning Fetch CPU receives instruction Decode CPU understands instruction Execute CPU performs computation Access CPU access required data from registers or memory Write back CPU stores result to registers or memory
  • 8. INSTRUCTION SET 1. Arithmetic( Two’s Complement)ALU OPERATION : ADD, SUB 2. Logical ALU Operations : AND, OR, XOR, NOT, SLA, SRA 3. Memory Operations : LI, LW, SW 4. Conditional Branch Operations : BIZ, BINZ 5. Program Count Jump Operations : JAL, JMP, JR
  • 10. CONTROL UNIT o Program Counter :The program counter stores the program(s) that the processor is running and will run in the future. o Instruction Register :The Instruction Register (IR) stores the current instruction, not the memory location. It’s main purpose is to provide information about the instruction to the Control Unit. o Controller :The controller is the main operator in the design. It sends control signals to both the Data path and Memory units to execute the instruction.
  • 11. MEMORY UNIT o 2:1 8-BIT MUX 21 : The main function of the MUX is to select the input address of the Memory submodule with the PC_addr from the PC or D_addr from the Control Unit. The Control Unit selects the output of the MUX with D_addr_sel. o 256x16-BIT MAIN MEMORY : This submodule contains the RISC Processor’s onboard memory. With 256 rows, the 16-bit memory takes in an 8-bit address to select the address space. It receives two control signals, D_rd and D_wr, for reading and writing operations respectively.
  • 12. DATA PATH UNIT o 3:1 16-BIT MUX : The MUX controls three different data lines into the Register Bank: the output from the ALU, Memory from the Memory Bank, and the 8-bit immediate from the Control Unit. o 16x16-BIT REGISTER BANK : The Register Bank consists of 16, 16-bit registers for general purpose. Given the RISC processor’s “load-store” approach to memory access, the register bank is extensively used for all instructions. o 16-BIT ALU : The 16-bit ALU is tasked with applying a logical or arithmetic operation on two operands that stem from the Register Bank. o RF_RP_ZERO : The RF_rp_zero submodule serves as combinational circuit to check if the output Rp from the Register Bank is zero.
  • 13. 16-BIT RISC PROCESSOR ARCHITECTURE
  • 15. TOOLS USED • SOFTWARE: CADENCE • LANGUAGE: VERILOG HDL
  • 16. Fig: Control signals for ten instructions RESULTS
  • 17. Fig: Memory and Data path Simulation
  • 19. ADVANTAGES o Performance is good. o Processor uses several transistors. o Allows the instruction to utilize open space on a microprocessor. o It is very simple as compared with another processor.
  • 20. APPLICATIONS o Video & Image Processing o Instrumentation o Super mini and CAD Machines o Telecommunication o Terminals
  • 21. CONCLUSION o A 16-bit RISC Processor has been implemented with Harvard architecture and 4-stage pipelining structure in one clock cycle. o This design can be used for portable devices such as Laptops, Mobiles and Tablets etc., The RISC architecture is simulated and synthesized using Cadence RTL Compiler.
  • 22. FUTURE SCOPE o In future, this design bits may be increased up to 64-bits. We can compare those RISC structures in various technology libraries like slow, fast and typical includes different technologies so that can improve the area, power and delay of the designs.
  • 23. REFERENCES o Rajesh Kumar B and Santha Kumar, "Implementation of a 16-Bit RISC Processor for Convolution Application", Advanced in Electronic and Electric Engineering, vol. 4, pp. 441-446, 2014. o Samiappa Sakthikumaran, S Salivahanan and V S Kanchana Baaskaran, "16-Bit RISC Processor Design for Convolution Applications", IEEE- International Conference on Recent Trends in Information Technology, pp. 394-397, Jun. 2011. o Ramandeep Kaur and Anuj, "8-Bit RISC Processor using Verilog HDL", Anuj et al Int. Journal of Engineering Research and Applications, vol. 4, pp. 417-422, Mar. 2014