R
Race-to-halt, definition,
26
Rack units (U), WSC architecture,
441
Radio frequency amplifier, radio receiver,
E-23
Radio receiver, components,
E-23
Radio waves, wireless networks, E-21
Radix-2 multiplication/division, J-4 to J-7,
J-6,
J-55
Radix-4 multiplication/division, J-48 to J-49,
J-49,
J-56 to J-57, J-60 to J-61
Radix-8 multiplication, J-49
RAID (Redundant array of inexpensive disks)
dependability benchmarks, D-21,
D-22
disk array deconstruction case study, D-51,
D-55
disk deconstruction case study, D-48
hardware dependability, D-15
historical background, L-79 to L-80
I/O subsystem design, D-59 to D-61
memory dependability,
104
NetApp FAS6000 filer, D-41 to D-42
overview, D-6 to D-8,
D-7
performance prediction, D-57 to D-59
reconstruction case study, D-55 to D-57
RAID 1
historical background, L-79
RAID 2
historical background, L-79
RAID 3
historical background, L-79 to L-80
RAID 4
historical background, L-79 to L-80
RAID 5
historical background, L-79 to L-80
RAID 6
characteristics, D-8 to D-9
hardware dependability, D-15
RAM (random access memory), switch microarchitecture, F-57
RAMAC-350 (Random Access Method of Accounting Control), L-77 to L-78, L-80 to L-81
Random Access Method of Accounting Control, L-77 to L-78
Random variables, distribution, D-26 to D-34
Ray casting (RC)
throughput computing kernel,
327
Read after read (RAR), absence of data hazard,
154
Read after write (RAW)
dynamic scheduling with Tomasulo’s algorithm,
170–171
first vector computers, L-45
instruction set complications,
C-50
microarchitectural techniques case study,
253
MIPS pipeline FP operations,
C-53
Tomasulo’s algorithm,
182
Read miss
AMD Opteron data cache,
B-14
coherence extensions,
362
directory-based cache coherence protocol example,
380,
382–386
memory hierarchy basics,
76–77
memory stall clock cycles,
B-4
Read operands stage
out-of-order execution,
C-71
Realizable processors, ILP limitations,
216–220
Real memory, Virtual Machines,
110
Real-time constraints, definition, E-2
Real-time performance, PMDs,
Real-time performance requirement, definition, E-3
Real-time processing, embedded systems, E-3 to E-5
Rearrangeably nonblocking, centralized switched networks, F-32 to F-33
Receiving overhead
communication latency, I-3 to I-4
interconnection networks, F-88
Reconfiguration deadlock, routing, F-44
Reconstruction, RAID, D-55 to D-57
Recovery time, vector processor, G-8
Recurrences
loop-carried dependences, H-5
Red-black Gauss-Seidel, Ocean application, I-9 to I-10
Reductions
commercial workloads,
371
loop-level parallelism dependences,
321
multiprogramming workloads,
377
T1 multithreading unicore performance,
227
Redundancy
chip fabrication cost case study,
61–62
computer system power consumption case study,
63–64
integrated circuit cost,
32
integrated circuit failure,
35
simple MIPS implementation,
C-33
Redundant multiplication, integers, J-48
Redundant power supplies, example calculations,
35
Reference bit
virtual memory block replacement,
B-45
Regional explicit congestion notification (RECN), congestion management, F-66
Register deferred addressing, VAX, K-67
Register fetch (RF)
simple MIPS implementation,
C-31
Register file
hardware-based speculation,
184
Multimedia SIMD Extensions,
282,
285
Tomasulo’s algorithm,
180,
182
Register indirect addressing mode, Intel 80x86, K-47
Register management, software-pipelined loops, H-14
Register-memory instruction set architecture
architect-compiler writer relationship,
A-30
Register prefetch, cache optimization,
92
Register renaming
hardware
vs. software speculation,
222
ILP for realizable processors,
216
instruction delivery and speculation,
202
microarchitectural techniques case study,
247–254
Tomasulo’s algorithm,
183
Register result status, MIPS scoreboard,
C-76
Registers
instructions and hazards,
C-17
Intel 80x86, K-47 to K-49,
K-48
network interface functions, F-7
Register stack engine, IA-64, H-34
Register tag example,
177
Register windows, SPARC instructions, K-29 to K-30
Regularity
bidirectional MINs, F-33 to F-34
compiler writing-architecture relationship,
A-30
Relative speedup, multiprocessor performance,
406
Relaxed consistency models
compiler optimization,
396
WSC storage software,
439
Release consistency, relaxed consistency models,
395
Reliability
Amdahl’s law calculations,
56
commercial interconnection networks, F-66
I/O subsystem design, D-59 to D-61
redundant power supplies,
34–35
Relocation, virtual memory,
B-42
Remainder, floating point, J-31 to J-32
Remote direct memory access (RDMA), InfiniBand, F-76
Remote node, directory-based cache coherence protocol basics,
381–382
Reorder buffer (ROB)
compiler-based speculation, H-31
dependent instructions,
199
FP unit with Tomasulo’s algorithm,
185
hardware-based speculation,
184–192
Replication
cache coherent multiprocessors,
354
centralized shared-memory architectures,
351–352
coherence enforcement,
354
RAID storage servers,
439
Reproducibility, performance results reporting,
41
Request
switch microarchitecture, F-58
Requested protection level, segmented virtual memory,
B-54
Request-level parallelism (RLP)
basic characteristics,
345
multicore processors,
400
parallelism advantages,
44
Request phase, arbitration, F-49
Request-reply deadlock, routing, F-44
Reservation stations
loop iteration example,
181
microarchitectural techniques case study,
253–254
Resource allocation
computer design principles,
45
Resource sparing, commercial interconnection networks, F-66
Response time
See also Latency
performance considerations,
36
performance trends,
18–19
producer-server model,
D-16
storage systems, D-16 to D-18
Responsiveness
as server characteristic,
Restorations, SLA states,
34
Restoring division, J-5,
J-6
Resume events
hardware-based speculation,
188
Return address predictors
instruction fetch bandwidth,
206–207
Returns
compiler technology and architectural decisions,
A-28
Intel 80x86 integer operations, K-51
procedure invocation options,
A-19
return address predictors,
206
Reverse path, cell phones, E-24
Rings
topology, F-35 to F-36,
F-36
Ripple-carry adder, J-3,
J-3,
J-42
Ripple-carry addition, J-2 to J-3
RISC (Reduced Instruction Set Computer)
addressing modes, K-5 to K-6
Alpha-unique instructions, K-27 to K-29
architecture flaws
vs. success,
A-45
ARM-unique instructions, K-36 to K-37
basic systems, K-3 to K-5
desktop/server systems,
K-4
multimedia extensions, K-16 to K-19
desktop systems
arithmetic/logical instructions,
K-11,
K-22
conditional branches,
K-17
control instructions,
K-12
data transfer instructions,
K-10,
K-21
FP instructions, K-13,
K-23
multimedia extensions,
K-18
early pipelined CPUs, L-26
embedded systems,
K-4
arithmetic/logical instructions,
K-15,
K-24
conditional branches,
K-17
control instructions,
K-16
data transfers,
K-14,
K-23
multiply-accumulate,
K-20
historical background, L-19 to L-21
instruction formats, K-5 to K-6
instruction set lineage,
K-43
ISA performance and efficiency prediction,
241
M32R-unique instructions, K-39 to K-40
MIPS16-unique instructions, K-40 to K-42
MIPS64-unique instructions, K-24 to K-27
MIPS core common extensions, K-19 to K-24
MIPS M2000
vs. VAX 8700,
L-21
Multimedia SIMD Extensions history, L-49 to L-50
PA-RISC-unique, K-33 to K-35
pipelining efficiency,
C-70
PowerPC-unique instructions, K-32 to K-33
Sanyo VPC-SX500 digital camera, E-19
SPARC-unique instructions, K-29 to K-32
SuperH-unique instructions, K-38 to K-39
Thumb-unique instructions, K-37 to K-38
vector processor history, G-26
Virtual Machines ISA support,
109
Virtual Machines and virtual memory and I/O,
110
Rounding modes, J-14, J-17 to J-19,
J-18,
J-20
Routing algorithm
commercial interconnection networks,
F-56
interconnection networks, F-21 to F-22,
F-27, F-44 to F-48
network impact, F-52 to F-55
and overhead, F-93 to F-94
SAN characteristics,
F-76
switched-media networks, F-24
switch microarchitecture pipelining, F-61
system area network history, F-100
Row access strobe (RAS), DRAM,
98
Row major order, blocking,
89
RS format instructions, IBM 360, K-87
Ruby on Rails, hardware impact on software development,
RX format instructions, IBM 360, K-86 to K-87