A Review of ARM Processor Architecture History, Progress and Applications

Muhammad Nabeel Asghar

Abstract


Globally, over 50 billion ARM architecture based embedded chips are produced which is the most commonly used 32-bit and 64-bit instruction set architecture in terms of quantity produced since 2014. Most of electronics and automotive gadgets round the world became a part of our daily use and we’ve got become dependent by them for doing most of our daily life work. Because of this, many of these devices are built-in with embedded processors that not only take less   silicone-space but also guarantee that users get smooth experience and less power consumption.

Keywords


ARM history, ARM architecture, RISC processor, CPSR register, modes of operation, ARM versions, CISC architecture, ARM Applications, ARM profile, Cortex-A, Cortex-R, Cortex M

Full Text:

Untitled PDF

References


X. Gong, Z. Shao, Q. Du, A. Yu, and J. Zhang, “Performance overhead analysis of virtualisation on ARM,” Int. J. Inf. Commun. Technol., vol. 12, no. 1–2, pp. 143–161, 2018.

S. Harris and D. Harris, Digital design and computer architecture: arm edition. Morgan Kaufmann, 2015.

B. Saeedi, “Comparison between Intel®AtomTM and ARM Cortex-A53.”

H. Seo, “Memory efficient implementation of modular multiplication for 32-bit ARM Cortex-M4,” Appl. Sci., vol. 10, no. 4, 2020, doi: 10.3390/app10041539.

M. Crinson, Modern architecture and the end of empire. Routledge, 2017.

N. Zlatanov, “ARM Architecture and RISC Applications.” 2016.

J. Grant, “Parallel Performance of ARM ThunderX2 for Atomistic Simulation Algorithms,” no. 1.

D. Yokoyama, B. Schulze, F. Borges, and G. Mc Evoy, The survey on ARM processors for HPC, vol. 75, no. 10. Springer US, 2019.

E. Limonova, A. Terekhin, D. Nikolaev, and V. Arlazarov, “Fast implementation of morphological filtering using arm neon extension,” Int. J. Appl. Eng. Res., vol. 11, no. 24, pp. 11675–11680, 2016.

C. Lin, H. Qian, and Z. Wang, “A High-Throughout Real-Time Prewitt Operator on Embedded NEON+ ARM System,” in 2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), 2018, pp. 270–273.

N. Liu, M. Yu, W. Zang, and R. Sandhu, “On the Cost-Effectiveness of TrustZone Defense on ARM Platform,” pp. 1–12.

A. Reid, “Who guards the guards? Formal validation of the Arm v8-M architecture specification,” Proc. ACM Program. Lang., vol. 1, no. OOPSLA, p. 88, 2017.

S. Lee and H. Yoo, “ARM Cortex-M0 DesignStart를 활용한 커스텀 시스템 설계 및 검증 Custom system design and verification using ARM Cortex-M0 DesignStart,” vol. 24, no. 2, 2020.

S. McIntosh-Smith, J. Price, T. Deakin, and A. Poenaru, “A performance analysis of the first generation of HPC-optimized Arm processors,” Concurr. Comput. , vol. 31, no. 16, pp. 1–13, 2019, doi: 10.1002/cpe.5110.

S. Aslan and S. C. .Ileri, “Performance Analysis of ARM big. LITTLE Architecture Based Mobile Processor with Multi-thread Face Detection,” in 2019 4th International Conference on Computer Science and Engineering (UBMK), 2019, pp. 336–339.

S. Pinto and N. Santos, “Demystifying Arm TrustZone: A Comprehensive Survey,” ACM Comput. Surv., vol. 51, no. 6, p. 130, 2019.

Y. M. P. Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama, and C. Rossow, “IoTPOT: A novel honeypot for revealing current IoT threats,” J. Inf. Process., 2016, doi: 10.2197/ipsjjip.24.522.

A. Lessoff, “Art and Architecture,” A Companion to Gilded Age Progress. Era, pp. 149–164, 2017, doi: 10.1002/9781118913994.ch12.

“Audience The ARM,” vol. 1, no. April, pp. 123–141, 1985.




DOI: http://dx.doi.org/10.36785/jaes.v10i2.446

Creative Commons License
Journal of Applied and Emerging Sciences by BUITEMS is licensed under a Creative Commons Attribution 4.0 International License.
Based on a work at www.buitms.edu.pk.
Permissions beyond the scope of this license may be available at http://journal.buitms.edu.pk/j/index.php/bj

Contacts | Feedback
© 2002-2014 BUITEMS